Publicacións en colaboración con investigadores/as de Université de Genève (20)

2014

  1. Concise security bounds for practical decoy-state quantum key distribution

    Physical Review A - Atomic, Molecular, and Optical Physics, Vol. 89, Núm. 2

  2. Finite-key analysis for measurement-device-independent quantum key distribution

    Nature Communications, Vol. 5

2012

  1. Security of distributed-phase-reference quantum key distribution

    Physical Review Letters, Vol. 109, Núm. 26

2008

  1. Quantization-based methods: Additive attacks performance analysis

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2006

  1. An accurate analysis of scalar quantization-based data hiding

    IEEE Transactions on Information Forensics and Security, Vol. 1, Núm. 1, pp. 80-86

  2. Robustness improvement of known-host-state data-hiding using host statistics

    Signal Processing, Vol. 86, Núm. 5, pp. 1076-1088

2005

  1. Data-hiding with partially available side information

    13th European Signal Processing Conference, EUSIPCO 2005

  2. On reversibility of random binning techniques: Multimedia perspectives

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  3. Practical data-hiding: Additive attacks performance analysis

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  4. Robustness improvement of known-host-state watermarking using host statistics

    Proceedings of SPIE - The International Society for Optical Engineering

  5. Worst case additive attack against quantization-based data-hiding methods

    Proceedings of SPIE - The International Society for Optical Engineering

2004

  1. Quantization-based watermarking performance improvement using host statistics: AWGN attack case

    Proceedings of the Multimedia and Security Workshop 2004, MM and Sec'04

  2. Revealing the true achievable rates of Scalar Costa Scheme

    2004 IEEE 6th Workshop on Multimedia Signal Processing

  3. Spread spectrum watermarking for real images: Is everything so hopeless?

    European Signal Processing Conference

  4. Worst case additive attack against quantization-based watermarking techniques

    2004 IEEE 6th Workshop on Multimedia Signal Processing