Argitalpenak (68) PEDRO COMESAÑA ALFARO argitalpenak

2024

  1. Preface

    IH MMSec 2024 - Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security

  2. Preface

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2023

  1. Preface

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2022

  1. A Critical Look into Quantization Table Generalization Capabilities of CNN-based Double JPEG Compression Detection

    European Signal Processing Conference

  2. Preface

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2017

  1. A Random Matrix Approach to the Forensic Analysis of Upscaled Images

    IEEE Transactions on Information Forensics and Security, Vol. 12, Núm. 9, pp. 2115-2130

  2. Random matrix theory for modeling the eigenvalue distribution of images under upscaling

    Communications in Computer and Information Science

  3. Smart Detection of Line-Search Oracle Attacks

    IEEE Transactions on Information Forensics and Security, Vol. 12, Núm. 3, pp. 588-603

2016

  1. Effect of compression on sensor-fingerprint based camera identification

    IS and T International Symposium on Electronic Imaging Science and Technology

  2. Fast sequential forensic detection of camera fingerprint

    Proceedings - International Conference on Image Processing, ICIP

  3. Improving selection-channel-aware steganalysis features

    IS and T International Symposium on Electronic Imaging Science and Technology

  4. V-DIFT: Vector-based dynamic information flow tracking with application to locating cryptographic keys for reverse engineering

    Proceedings - 2016 11th International Conference on Availability, Reliability and Security, ARES 2016

2015

  1. An SVD approach to forensic image resampling detection

    2015 23rd European Signal Processing Conference, EUSIPCO 2015

  2. Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images

    IEEE Transactions on Information Forensics and Security, Vol. 10, Núm. 11, pp. 2257-2269

  3. On the effectiveness of meta-detection for countering oracle attacks in watermarking

    2015 IEEE International Workshop on Information Forensics and Security, WIFS 2015 - Proceedings

  4. Preface

    IH and MMSec 2015 - Proceedings of the 2015 ACM Workshop on Information Hiding and Multimedia Security

2014

  1. A new look at ML step-size estimation for Scalar Costa scheme data hiding

    2014 IEEE International Conference on Image Processing, ICIP 2014

  2. Are you threatening me?: Towards smart detectors in watermarking

    Proceedings of SPIE - The International Society for Optical Engineering

  3. Flat fading channel estimation based on Dirty Paper Coding

    ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings

  4. The optimal attack to histogram-based forensic detectors is simple(x)

    2014 IEEE International Workshop on Information Forensics and Security, WIFS 2014