Primary tabs
“Technical Report: MPEG-2 Prediction Residue Analysis”, University of Vigo, 2019. TR19.pdf (501.11 KB)
, “Camera Attribution Forensic Analyzer in the Encrypted Domain”, in IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, 2018. PMTP18_WIFS18.pdf (655.48 KB)
, “Putting the PRNU Model in Reverse Gear: Findings with Synthetic Signals”, in European Signal Processing Conference (EUSIPCO), Rome, Italy, 2018. Eusipco18_Masciopinto_PerezGonzalez.pdf (600.61 KB)
, “Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms”, in ACM Conference on Computer and Communications Security (CCS), 2017. CCSmain.pdf (1.82 MB)
, “Design of projection matrices for PRNU compression”, in 2017 IEEE Workshop on Information Forensics and Security (WIFS), 2017, pp. 1-6. 2017_prnu_projection.pdf (689.14 KB)
, “Filter design for delay-based anonymous communications”, in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2017. ICASSPmain.pdf (382.42 KB)
, “Is Geo-Indistinguishability what you are looking for?”, in Workshop on Privacy in the Electronic Society (WPES), 2017. 1709.06318.pdf (822.66 KB)
, “Number Theoretic Transforms for Secure Signal Processing”, IEEE Transactions on Information Forensics and Security, vol. 12, no. 5, pp. 1125-1140, 2017. PTP17_TIFS.pdf (651.54 KB)
, “A Random Matrix Approach to the Forensic Analysis of Upscaled Images”, IEEE Transactions on Information Forensics and Security, vol. 12, no. 9, pp. 2115-2130, 2017. TIFS17_resampling.pdf (1.04 MB)
, “Random Matrix Theory for Modeling the Eigenvalue Distribution of Images under Upscaling”, in International Tyrrhenian Workshop on Digital Communication 2017, Palermo, Italy, 2017, pp. 109-124. TIWDC17_dvazquez_fperez_pcomesan.pdf (394.61 KB)
, “Secure Genomic Susceptibility Testing based on Lattice Encryption”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, USA, 2017. TPP17_ICASSP17.pdf (403.53 KB)
, “Smart Detection of Line-Search Oracle Attacks”, IEEE Transactions on Information Forensics and Security, vol. 12, no. 3, pp. 588-603, 2017. TIFS_smartOracle.pdf (3.73 MB)
, “Statistical detection of JPEG traces in digital images in uncompressed formats”, IEEE Transactions on Information Forensics and Security, vol. 12, no. Pending, 2017. TIFSbenford.pdf (5.94 MB)
, , “Data Hiding Robust to Mobile Communication Vocoders”, IEEE Transactions on Multimedia, vol. 18, no. 12, pp. 2345-2357, 2016. TMM2599149.pdf (3.04 MB)
, “Design of pool mixes against profiling attacks in real conditions”, IEEE/ACM Transactions on Networking, vol. 24, no. 6, pp. 3662-3675, 2016. TNET2547391_author_version.pdf (1.96 MB)
, “Dynamic Privacy-Preserving Genomic Susceptibility Testing”, in ACM Workshop on Information Hiding and Multimedia Security, 2016, pp. 45-50. IHMMSec2016-GenomicPrivSusceptibility.pdf (359.18 KB)
, “Fast Sequential Forensic Detection of Camera Fingerprint”, in IEEE International Conference on Image Processing (ICIP), 2016. perez.pdf (325.29 KB)
, “Forensics of high quality and nearly identical JPEG image recompression”, in ACM Workshop on Information Hiding and Multimedia Security, 2016. HQ_multipleJPEG.pdf (1.33 MB)
, “Image denoising in the encrypted domain”, in IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, UAE, 2016. PTP16_WIFS16.pdf (527.76 KB)
, , , “Forensic detection of processing operator chains: recovering the history of filtered JPEG images”, IEEE Transactions on Information Forensics and Security, 2015. tifs.pdf (2.46 MB)
, “Multivariate Lattices for Encrypted Image Processing”, in IEEE International Conference on Acoustics, Speech and Signal Processing, Brisbane, Australia, 2015. PedrouzoICASSP2015.pdf (348.56 KB)
, “An SVD Approach to Forensic Image Resampling Detection”, in EUSIPCO, 2015, pp. 2112-2116. eusipco15_dvazquez_pcomesan_fperez.pdf (169.61 KB)
,