S
J. R. Troncoso-Pastoriza, Pedrouzo-Ulloa, A., and Pérez-González, F., Secure Genomic Susceptibility Testing based on Lattice Encryption, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, USA, 2017.PDF icon TPP17_ICASSP17.pdf (403.53 KB)
B. Tondi, Comesaña, P., Pérez-González, F., and Barni, M., Smart Detection of Line-Search Oracle Attacks, IEEE Transactions on Information Forensics and Security, vol. 12, no. 3, pp. 588-603, 2017.PDF icon TIFS_smartOracle.pdf (3.73 MB)
C. Pasquini, Boato, G., and Pérez-González, F., Statistical detection of JPEG traces in digital images in uncompressed formats, IEEE Transactions on Information Forensics and Security, vol. 12, no. Pending, 2017.PDF icon TIFSbenford.pdf (5.94 MB)
I
A. Pedrouzo-Ulloa, Troncoso-Pastoriza, J. R., and Pérez-González, F., Image denoising in the encrypted domain, in IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, UAE, 2016.PDF icon PTP16_WIFS16.pdf (527.76 KB)
M
A. Pedrouzo-Ulloa, Troncoso-Pastoriza, J. R., and Pérez-González, F., Multivariate Lattices for Encrypted Image Processing, in IEEE International Conference on Acoustics, Speech and Signal Processing, Brisbane, Australia, 2015.PDF icon PedrouzoICASSP2015.pdf (348.56 KB)
B
C. Pasquini, Pérez-González, F., and Boato, G., A Benford-Fourier JPEG compression detector, in IEEE International Conference on Image Processing (ICIP), Paris, France, 2014.PDF icon benford_icip_rice_new.pdf (235.58 KB)
F
G. Domínguez-Conde, Comesaña, P., and Pérez-González, F., Flat Fading Channel Estimation Based on Dirty Paper Coding, in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Florence, Italy, 2014.PDF icon icassp14_gdc_pca_fpg.pdf (154.64 KB)
M
C. Pasquini, Boato, G., and Pérez-González, F., Multiple JPEG compression detection by means of Benford-Fourier coefficients, in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014.
O
P. Comesaña and Pérez-González, F., The optimal attack to histogram-based forensic detectors is simple(x), in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014, pp. 137-142.PDF icon wifs14.pdf (265.04 KB)