Publicacións en colaboración con investigadores/as de Gradiant, Centro Tecnolóxico de Telecomunicacións de Galicia (24)

2014

  1. A Benford-Fourier JPEG compression detector

    2014 IEEE International Conference on Image Processing, ICIP 2014

  2. A least squares approach to the static traffic analysis of high-latency anonymous communication systems

    IEEE Transactions on Information Forensics and Security, Vol. 9, Núm. 9, pp. 1341-1355

  3. A new look at ML step-size estimation for Scalar Costa scheme data hiding

    2014 IEEE International Conference on Image Processing, ICIP 2014

  4. Flat fading channel estimation based on Dirty Paper Coding

    ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings

  5. The optimal attack to histogram-based forensic detectors is simple(x)

    2014 IEEE International Workshop on Information Forensics and Security, WIFS 2014

  6. Transportation-theoretic image counterforensics to First Significant Digit histogram forensics

    ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings

  7. Understanding the effects of real-world behavior in statistical disclosure attacks

    2014 IEEE International Workshop on Information Forensics and Security, WIFS 2014

2013

  1. Forensic analysis of full-frame linearly filtered JPEG images

    2013 IEEE International Conference on Image Processing, ICIP 2013 - Proceedings

  2. Fully private noninteractive face verification

    IEEE Transactions on Information Forensics and Security, Vol. 8, Núm. 7, pp. 1101-1114

  3. Joint detection of full-frame linear filtering and JPEG compression in digital images

    Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013

  4. Meet the family of statistical disclosure attacks

    2013 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2013 - Proceedings

  5. Multimedia operator chain topology and ordering estimation based on detection and information theoretic tools

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  6. Quantization lattice estimation for multimedia forensics

    2013 IEEE International Conference on Image Processing, ICIP 2013 - Proceedings

  7. Set-membership identification of resampled signals

    Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013

  8. Taking advantage of source correlation in forensic analysis

    2013 IEEE International Workshop on Multimedia Signal Processing, MMSP 2013

2012

  1. An adaptive feedback canceller for full-duplex relays based on spectrum shaping

    IEEE Journal on Selected Areas in Communications, Vol. 30, Núm. 8, pp. 1566-1577

  2. Exposing original and duplicated regions using SIFT features and resampling traces

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  3. Fully homomorphic faces

    Proceedings - International Conference on Image Processing, ICIP

  4. Understanding statistical disclosure: A least squares approach

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2011

  1. A new method for perspective correction of document images

    Proceedings of SPIE - The International Society for Optical Engineering