Primary tabs
“Secure Signal Processing in the Cloud: enabling technologies for privacy-preserving multimedia cloud processing”, IEEE Signal Processing Magazine, vol. 30, no. 2, pp. 29-41, 2013. cloudspm2013.pdf (965.61 KB)
, “Set-Membership Identification of Resampled Signals”, in IEEE International Workshop on Information Forensics and Security (WIFS), Guangzhou, China, 2013. wifs13_dvazquez_pcomesan_fperez.pdf (171.35 KB)
, “Taking advantage of source correlation in forensic analysis”, in IEEE International Workshop on Multimedia Signal Processing, Pula (Sardinia), Italy, 2013, pp. 159-164. mmsp13.pdf (167.27 KB)
, “An Adaptive Feedback Canceller for Full-Duplex Relays Based on Spectrum Shaping”, IEEE J. Selected Areas in Communications, vol. 30, no. 8, pp. 1566 - 1577, 2012. jsac_paper.pdf (656.09 KB)
, “Fingerprinting a flow of messages to an anonymous server.”, in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 97–102. wifs2012_elices.pdf (277.81 KB)
, “Fully Homomorphic Faces”, in IEEE International Conference on Image Processing (ICIP), Lake Buena Vista, Florida, USA, 2012. cryptofaces.pdf (213.56 KB)
, “A Least Squares approach to user profiling in pool mix-based anonymous communication systems.”, in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 115–120. wifs2012_pg.pdf (321.08 KB)
, “Multimedia operator chain topology and ordering estimation based on detection and information theoretic tools”, in International Workshop on Digital-forensics and Watermarking, Shanghai, China, 2012. iwdw12.pdf (326.11 KB)
, “Overlay Cognitive Transmission in a Multicarrier Broadcast Network with Dominant Line of Sight Reception”, IEEE Transactions on Wireless Communications, 2012. twc-ricomosqueraperez.pdf (688.14 KB)
, “Overlay Spectrum Reuse in a Multicarrier Broadcast Network: Coverage Analysis”, in The 13th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC 2012), Cesme, Turkey, 2012. spawc12-ricomosqueraperez-cov.pdf (307.82 KB)
, “Overlay Spectrum Reuse in a Multicarrier Broadcast Network: Single Receiver Analysis”, in The 13th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC 2012), Cesme, Turkey, 2012. spawc12-ricomosqueraperez-su.pdf (350.45 KB)
, “Understanding statistical disclosure: A least squares approach”, in Privacy Enhancing Technologies Symposium (PETS), Vigo, Spain, 2012, pp. 38–57. pets2012_fpg.pdf (450.58 KB)
, “On the Co-existence of Primary and Secondary Transmitters in a Broadcast Network”, in International Conference on Cognitive Radio and Advanced Spectrum Management, Barcelona, Catalonia, Spain, 2011.
, “A Dirty Paper Scheme for Hierarchical OFDM”, in IEEE International Conference on Communications (ICC), Kioto, Japan, 2011.
, “Efficient Protocols for Secure Adaptive Filtering”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prage, Czech Republic, 2011, pp. 5860-5863. secure_adaptive_filteringICASSP2011.pdf (115.55 KB)
, “Exposing original and duplicated regions using SIFT features and resampling traces”, in International Workshop on Digital Watermarking (IWDW), Atlantic City, USA, 2011, pp. 306-320. iwdw2011_dvazquez_fperez.pdf (943.16 KB)
, “Gain-Invariant Dirty Paper Coding for Hierarchical OFDM”, IEEE Transactions on Communications, vol. 59, pp. 3323-3334, 2011.
, “A new method for perspective correction of document images”, in Document Recognition and Retrieval, San Francisco, CA, 2011, vol. 7874, p. 787410. spie-2011.pdf (439.17 KB)
, “Prefilter Design for Forensic Resampling Estimation”, in IEEE International Workshop on Information Forensics and Security (WIFS), Foz do Iguaçu, Brazil, 2011, pp. 1-6. wifs2011_dvazquez_fperez.pdf (301.04 KB)
, “Secure Adaptive Filtering”, IEEE Transactions on Information Forensics and Security, vol. 6, pp. 469 -485, 2011. TPPGTIFS11-Secure_Adaptive_Filtering.pdf (396.27 KB)
, “Weber's law-based side-informed data hiding”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prague, Czech Republic, 2011, pp. 1840-1843. comesanaicassp11.pdf (119.42 KB)
, “Witsenhausen's counterexample and its links with multimedia security problems”, in International Workshop on Digital Watermarking (IWDW), Atlantic City, USA, 2011. iwdw11_witsenhausen.pdf (152.97 KB)
, “CryptoDSPs for Cloud Privacy”, in International Workshop on Cloud Information System Engineering (CISE), Hong Kong, China, 2010, vol. 6724.
, “Leaving Timing Channel Fingerprints in Hidden Service Log Files”, Digital Investigation, 2010.
, “Leaving Timing Channel Fingerprints in Hidden Service Log Files”, in Digital Forensic Research Workshop Annual Conference (DFRWS), Portland, Oregon, 2010.
,