Primary tabs
“A Critical Look into Quantization Table Generalization Capabilities of CNN-based Double JPEG Compression Detection”, in EUSIPCO, Belgrade, Serbia, 2022.
EUSIPCO22_erodriguez_dvazquez_fperez_pcomesan.pdf (518.97 KB)
, 
“Secure Collaborative Camera Attribution”, in European Interdisciplinary Cybersecurity Conference (EICC), Barcelona, Spain, 2022, pp. 97-98.
, “DNN Watermarking: Four Challenges and a Funeral”, in 2021 ACM Workshop on Information Hiding and Multimedia Security, IH&MMSEC'21, Virtual Event Belgium, 2021, pp. 189-196.
ihmm13-barniA.pdf (515.94 KB)
, 
“On the information leakage quantification of camera fingerprint estimates”, Eurasip Journal on Information Security, vol. 2021, no. 6, p. 18, 2021.
bmc_article.pdf (4.19 MB)
, 
“A Review of "Camera Attribution Forensic Analyzer in the Encrypted Domain"”, in VI Jornadas Nacionales de Investigación en Ciberseguridad (JNIC), 2021.
PMTP21-JNIC21.pdf (259.84 KB)
, 
“Revisiting multivariate ring learning with errors and its applications on lattice-based cryptography”, Mathematics, vol. 9, no. 8, 2021.
PTGGP21.pdf (1.04 MB)
, 
“Adam and the Ants: On the Influence of the Optimization Algorithm on the Detectability of DNN Watermarks”, vol. 22, no. 12, p. 36, 2020.
, “Multiquadratic Rings and Walsh-Hadamard Transforms for Oblivious Linear Function Evaluation”, in IEEE International Workshop on Information Forensics and Security (WIFS), 2020.
PTGGP20-WIFS20.pdf (645.17 KB)
, 
“PRNU-leaks: facts and remedies”, in 2020 28th European Signal Processing Conference (EUSIPCO), Virtual Event Amsterdam, 2020.
, “Temporal Localization of Non-Static Digital Videos Using the Electrical Network Frequency”, IEEE Signal Processing Letters, vol. 27, p. 5, 2020.
, “Video Integrity Verification and GOP Size Estimation via Generalized Variation of Prediction Footprint”, IEEE Transactions on Information Forensics and Security, vol. 15, no. 1, pp. 1815-1830, 2020.
TIFS19_GVPF.pdf (1.01 MB)
, 
“Dynamic Attribute-Based Privacy-Preserving Genomic Susceptibility Testing”, in 34th Annual ACM Symposium on Applied Computing, SAC 2019, Limassol, Cyprus, 2019.
SAC19Final.pdf (745.27 KB)
, 
“Efficient PRNU Matching in the Encrypted Domain”, in XoveTIC, A Coruña, Spain, 2019.
PMTP19_XoveTIC19.pdf (517.32 KB)
, 
“Improving PRNU Compression Through Preprocessing, Quantization, and Coding”, IEEE Transactions on Information Forensics and Security, vol. 14, no. 3, p. 13, 2019.
2018_prnu_resize_deadzone.pdf (3.81 MB)
, 
“Prediction Residue Analysis in MPEG-2 Double Compressed Video Sequences”, in EUSIPCO, A Coruña, Spain, 2019, pp. 1109-1113.
eusipco19_dvazquez_fperez.pdf (392.31 KB)
, 
“Rethinking Location Privacy for Unknown Mobility Behaviors”, in IEEE European Symposium on Security and Privacy (EuroS&P), 2019.
ms.pdf (634.43 KB)
, 
“Revisiting Multivariate Lattices for Encrypted Signal Processing”, in ACM Information Hiding and Multimedia Security Workshop (IH&MMSec), Paris, France, 2019.
PTP19_IHMMSec19.pdf (1.67 MB)
, 
“Technical Report: MPEG-2 Prediction Residue Analysis”, University of Vigo, 2019.
TR19.pdf (501.11 KB)
, 
“Camera Attribution Forensic Analyzer in the Encrypted Domain”, in IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, 2018.
PMTP18_WIFS18.pdf (655.48 KB)
, 
“Putting the PRNU Model in Reverse Gear: Findings with Synthetic Signals”, in European Signal Processing Conference (EUSIPCO), Rome, Italy, 2018.
Eusipco18_Masciopinto_PerezGonzalez.pdf (600.61 KB)
, 
“Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms”, in ACM Conference on Computer and Communications Security (CCS), 2017.
CCSmain.pdf (1.82 MB)
, 
“Design of projection matrices for PRNU compression”, in 2017 IEEE Workshop on Information Forensics and Security (WIFS), 2017, pp. 1-6.
2017_prnu_projection.pdf (689.14 KB)
, 
“Filter design for delay-based anonymous communications”, in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2017.
ICASSPmain.pdf (382.42 KB)
, 
“Is Geo-Indistinguishability what you are looking for?”, in Workshop on Privacy in the Electronic Society (WPES), 2017.
1709.06318.pdf (822.66 KB)
, 
“Number Theoretic Transforms for Secure Signal Processing”, IEEE Transactions on Information Forensics and Security, vol. 12, no. 5, pp. 1125-1140, 2017.
PTP17_TIFS.pdf (651.54 KB)
, 