Primary tabs
“Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks”, IEEE Transactions on Signal Processing, vol. 53, pp. 3960-3975, 2005.
, “The return of the sensitivity attack”, in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274.
iwdw05.pdf (190.47 KB)
, 
“Robustness Improvement of Known-Host-State Watermarking Using Host Statistics”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, “Spread-spectrum vs. quantization-based data hiding: misconceptions and implications”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, “Worst case additive attack against quantization-based data-hiding methods”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, “Bias analysis and removal of a microphone array based road traffic speed estimator”, in European Signal Processing Conference (EUSIPCO), Vienna, Austria, 2004.
biasanalysis.pdf (106.81 KB)
, 
“Blind iterative decoding of side-informed data hiding using the Expectation-Maximization algorithm”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 805-815.
spie04em.pdf (434.03 KB)
, 
“Blind Turbo Decoding of Side-Informed Data Hiding Using Iterative Channel Estimation”, in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Lisboa, 2004.
, “Estimation of road vehicle speed using two omnidirectional microphones: a maximum likelihood approach”, EURASIP Journal of Applied Signal Processing, vol. 2004, pp. 1059–1077, 2004.
regular.406.pdf (736.38 KB)
, 
“Improved Binary Dither-Modulation with perceptual constraints”, in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Lisboa, Portugal, 2004.
wiamis04_dm.ps (268.36 KB)
, 
“Quantifying Security Leaks in Spread Spectrum Data Hiding: A Game Theoretic Approach”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 592-601.
spie04.ps (572.73 KB)
, 
“Quantization-based watermarking performance improvement using host statistics: additive noise attack”, in ACM Workshop on Multimedia and Security (MMSEC), Magdeburg, Germany, 2004.
, “Rational Dither Modulation: a novel data-hiding method robust to value-metric attacks”, in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 139-142.
, “Revealing the true achievable rates of Scalar Costa Scheme”, in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 203-206.
, “Spread Spectrum Watermarking for Real Images: Is Everything So Hopeless?”, in European Signal Processing Conference (EUSIPCO), Vienna, Austria, 2004.
, “Worst case additive attack against quantization-based watermarking techniques”, in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 135-138.
, “Dither-Modulation Data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks.”, in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003.
icip03a.pdf (145.04 KB)
, 
“Hexagonal Quantizers are not Optimal for 2-D Data Hiding”, in Security and Watermarking of Multimedia Contents, Santa Clara, USA, 2003, vol. 5020.
, “The Importance of aliasing in structured quantization index modulation data hiding (invited lecture)”, in International Workshop on Digital Watermarking (IWDW), 2003, vol. 2939 / 2004, pp. 1-17.
, “Optimal Data-Hiding Strategies for Games with BER Payoffs”, in International Workshop on Digital Watermarking (IWDW), 2003, vol. 2939 / 2004, pp. 101-116.
iwdw03.ps (499.03 KB)
, 
“Optimal Strategies for Spread-Spectrum and Quantized-Projection image data hiding games with BER Payoffs”, in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003.
icip03b.pdf (142.96 KB)
, 
“Performance Analysis of Existing and New Methods for Data Hiding with Known-Host Information in Additive Channels”, IEEE Transactions on Signal Processing, vol. 51, pp. 960-980, 2003.
, “Subband hyperstable adaptive IIR filters”, IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, vol. 50, pp. 383–389, 2003.
, “Visible Encryption: Using Paper as a Secure Channel”, in Security and Watermarking of Multimedia Contents, Santa Clara, USA, 2003, vol. 5020.
, “Analysis of Pilot-Based Synchronization Algorithms for Watermarking of Still Images”, Signal Processing: Image Communication, vol. 17, pp. 661-633, 2002.
,