Fernando Pérez-González
Orcid: 0000-0002-0568-1373Affiliations:
- University of Vigo, School of Telecommunication Engineering, Spain
- University of New Mexico, Albuquerque, NM, USA
According to our database1,
Fernando Pérez-González
authored at least 217 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 2016, "For contributions to multimedia security".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
An Adaptive Method for Camera Attribution Under Complex Radial Distortion Corrections.
IEEE Trans. Inf. Forensics Secur., 2024
CoRR, 2024
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024
2023
IEEE Signal Process. Mag., July, 2023
Source camera attribution via PRNU emphasis: Towards a generalized multiplicative model.
Signal Process. Image Commun., May, 2023
Towards Traitor Tracing in Black-and-White-Box DNN Watermarking with Tardos-Based Codes.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023
Exploiting PRNU and Linear Patterns in Forensic Camera Attribution under Complex Lens Distortion Correction.
Proceedings of the IEEE International Conference on Acoustics, 2023
Introducing the TRUMPET project: TRUstworthy Multi-site Privacy Enhancing Technologies.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
2022
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022
A Critical Look into Quantization Table Generalization Capabilities of CNN-based Double JPEG Compression Detection.
Proceedings of the 30th European Signal Processing Conference, 2022
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022
2021
EURASIP J. Inf. Secur., 2021
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021
2020
Video Integrity Verification and GOP Size Estimation Via Generalized Variation of Prediction Footprint.
IEEE Trans. Inf. Forensics Secur., 2020
Temporal Localization of Non-Static Digital Videos Using the Electrical Network Frequency.
IEEE Signal Process. Lett., 2020
Adam and the Ants: On the Influence of the Optimization Algorithm on the Detectability of DNN Watermarks.
Entropy, 2020
Multiquadratic Rings and Walsh-Hadamard Transforms for Oblivious Linear Function Evaluation.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020
Proceedings of the 28th European Signal Processing Conference, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
Revisiting Multivariate Ring Learning with Errors and its Applications on Lattice-based Cryptography.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
Proceedings of the 27th European Signal Processing Conference, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
2018
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018
Proceedings of the 26th European Signal Processing Conference, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Inf. Forensics Secur., 2017
CoRR, 2017
Derivation of the Asymptotic Eigenvalue Distribution for Causal 2D-AR Models under Upscaling.
CoRR, 2017
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017
Random Matrix Theory for Modeling the Eigenvalue Distribution of Images Under Upscaling.
Proceedings of the Digital Communication. Towards a Smart and Secure Future Internet, 2017
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017
Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
IEEE/ACM Trans. Netw., 2016
On Ideal Lattices over the Tensor Product of Number Fields and Ring Learning with Errors over Multivariate Rings.
CoRR, 2016
IEEE Access Special Section Editorial: Latest Advances and Emerging Applications of Data Hiding.
IEEE Access, 2016
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016
2015
Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images.
IEEE Trans. Inf. Forensics Secur., 2015
On the effectiveness of meta-detection for countering oracle attacks in watermarking.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015
Proceedings of the 23rd European Signal Processing Conference, 2015
2014
A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems.
IEEE Trans. Inf. Forensics Secur., 2014
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014
Proceedings of the Media Watermarking, 2014
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014
Transportation-theoretic image counterforensics to First Significant Digit histogram forensics.
Proceedings of the IEEE International Conference on Acoustics, 2014
Proceedings of the IEEE International Conference on Acoustics, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Secure Signal Processing in the Cloud: Enabling Technologies for Privacy-Preserving Multimedia Cloud Processing.
IEEE Signal Process. Mag., 2013
IEEE Signal Process. Mag., 2013
Exploiting Geometrical Structure for Forensic Applications of Timing Inference Channels.
Int. J. Digit. Crime Forensics, 2013
CoRR, 2013
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013
Joint detection of full-frame linear filtering and JPEG compression in digital images.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013
Proceedings of the 15th IEEE International Workshop on Multimedia Signal Processing, 2013
Proceedings of the IEEE International Conference on Image Processing, 2013
Proceedings of the IEEE International Conference on Image Processing, 2013
Proceedings of the IEEE International Conference on Acoustics, 2013
Proceedings of the IEEE International Conference on Acoustics, 2013
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
2012
Overlay Cognitive Transmission in a Multicarrier Broadcast Network with Dominant Line of Sight Reception.
IEEE Trans. Wirel. Commun., 2012
IEEE J. Sel. Areas Commun., 2012
A Least Squares approach to user profiling in pool mix-based anonymous communication systems.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Overlay spectrum reuse in a multicarrier broadcast network: Single receiver analysis.
Proceedings of the 13th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2012
Proceedings of the 13th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2012
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012
Multimedia Operator Chain Topology and Ordering Estimation Based on Detection and Information Theoretic Tools.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012
Proceedings of the 19th IEEE International Conference on Image Processing, 2012
2011
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of the IEEE International Conference on Acoustics, 2011
Proceedings of the IEEE International Conference on Acoustics, 2011
Proceedings of the Document Recognition and Retrieval XVIII, 2011
Proceedings of the CogART 2011, 2011
2010
Digit. Investig., 2010
Proceedings of the Web Information Systems Engineering - WISE 2010 Workshops, 2010
Two-dimensional statistical test for the presence of almost cyclostationarity on images.
Proceedings of the International Conference on Image Processing, 2010
Proceedings of the International Conference on Image Processing, 2010
Proceedings of the IEEE International Conference on Acoustics, 2010
2009
IEEE Trans. Inf. Forensics Secur., 2009
EURASIP J. Inf. Secur., 2009
An extended analysis of discrete fourier tranform - rational dither modulation for non-white hosts.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
Proceedings of the Media Forensics and Security I, 2009
Proceedings of the International Conference on Image Processing, 2009
Proceedings of the International Conference on Image Processing, 2009
Proceedings of the International Conference on Image Processing, 2009
Proceedings of the 9th ACM Workshop on Digital Rights Management, 2009
2008
IEEE Trans. Inf. Forensics Secur., 2008
IEEE Trans. Inf. Forensics Secur., 2008
Trans. Data Hiding Multim. Secur., 2008
Proceedings of the Information Hiding, 10th International Workshop, 2008
2007
Efficient Zero-Knowledge Watermark Detection with Improved Robustness to Sensitivity Attacks.
EURASIP J. Inf. Secur., 2007
EURASIP J. Inf. Secur., 2007
Efficient non-interactive zero-knowledge watermark detector robust to sensitivity attacks.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Proceedings of the 9th workshop on Multimedia & Security, 2007
Proceedings of the Digital Watermarking, 6th International Workshop, 2007
Proceedings of the Information Hiding, 9th International Workshop, 2007
Proceedings of the International Conference on Image Processing, 2007
Modeling Gabor Coefficients via Generalized Gaussian Distributions for Face Recognition.
Proceedings of the International Conference on Image Processing, 2007
Proceedings of the International Conference on Image Processing, 2007
Proceedings of the International Conference on Image Processing, 2007
Proceedings of the IEEE International Conference on Acoustics, 2007
2006
IEEE Trans. Signal Process., 2006
IEEE Trans. Inf. Forensics Secur., 2006
IEEE Trans. Inf. Forensics Secur., 2006
IEEE Signal Process. Lett., 2006
Signal Process., 2006
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Secret dither estimation in lattice-quantization data hiding: a set membership approach.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Proceedings of the Multimedia Content Representation, 2006
Proceedings of the 8th workshop on Multimedia & Security, 2006
On achievable security levels for lattice data hiding in the known message attack scenario.
Proceedings of the 8th workshop on Multimedia & Security, 2006
2005
Rational dither modulation: a high-rate data-hiding method invariant to gain attacks.
IEEE Trans. Signal Process., 2005
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the Digital Watermarking, 4th International Workshop, 2005
Proceedings of the Digital Watermarking, 4th International Workshop, 2005
Proceedings of the Digital Watermarking, 4th International Workshop, 2005
Proceedings of the Information Hiding, 7th International Workshop, 2005
Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis.
Proceedings of the Information Hiding, 7th International Workshop, 2005
Angle QIM: a novel watermark embedding scheme robust against amplitude scaling distortions.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005
An Exact Expression for the Bit Error Probability in Angle QIM Watermarking Under Simultaneous Amplitude Scaling and AWGN Attacks.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005
Proceedings of the 13th European Signal Processing Conference, 2005
2004
Estimation of Road Vehicle Speed Using Two Omnidirectional Microphones: A Maximum Likelihood Approach.
EURASIP J. Adv. Signal Process., 2004
Quantifying security leaks in spread spectrum data hiding: a game-theoretic approach.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
Blind iterative decoding of side-informed data hiding using the expectation-maximization algorithm.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004
Rational dither modulation: a novel data-hiding method robust to value-metric scaling attacks.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004
Quantization-based watermarking performance improvement using host statistics: AWGN attack case.
Proceedings of the 6th workshop on Multimedia & Security, 2004
Proceedings of the 2004 12th European Signal Processing Conference, 2004
Proceedings of the 2004 12th European Signal Processing Conference, 2004
2003
Performance analysis of existing and new methods for data hiding with known-host information in additive channels.
IEEE Trans. Signal Process., 2003
IEEE Trans. Circuits Syst. II Express Briefs, 2003
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003
Proceedings of the Digital Watermarking, Second International Workshop, 2003
Proceedings of the Digital Watermarking, Second International Workshop, 2003
Dither-modulation data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks.
Proceedings of the 2003 International Conference on Image Processing, 2003
The effect of the random jitter attack on the bit error rate performance of spatial domain image watermarking.
Proceedings of the 2003 International Conference on Image Processing, 2003
Optimal strategies for spread-spectrum and quantized-projection image data hiding games with BER payoffs.
Proceedings of the 2003 International Conference on Image Processing, 2003
2002
Signal Process. Image Commun., 2002
Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation.
Proceedings of the Information Hiding, 5th International Workshop, 2002
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002
Proceedings of the 2002 International Conference on Image Processing, 2002
Proceedings of the IEEE International Conference on Acoustics, 2002
Proceedings of the IEEE International Conference on Acoustics, 2002
2001
Adaptive lattice IIR filtering revisited: convergence issues and new algorithms with improved stability properties.
IEEE Trans. Signal Process., 2001
Approaching the capacity limit in image watermarking: a perspective on coding techniques for data hiding applications.
Signal Process., 2001
Special section on "Signal Processing Techniques for Emerging Communications Applications".
Signal Process., 2001
IEEE Commun. Lett., 2001
IEEE Commun. Mag., 2001
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001
2000
DCT-domain watermarking techniques for still images: detector performance analysis and a new structure.
IEEE Trans. Image Process., 2000
Convergence analysis of the multiple-channel filtered-U recursive LMS algorithm for active noise control.
Signal Process., 2000
Signal Process., 2000
Analytical Bounds on the Error Performance of the DVB-T System in Time-Invariant Channels.
Proceedings of the 2000 IEEE International Conference on Communications: Global Convergence Through Communications, 2000
Proceedings of the IEEE International Conference on Acoustics, 2000
1999
IEEE Trans. Signal Process., 1999
IEEE Signal Process. Lett., 1999
Signal Process., 1999
Proc. IEEE, 1999
Novel techniques for watermark extraction in the DCT domain.
Proceedings of the IEEE-EURASIP Workshop on Nonlinear Signal and Image Processing (NSIP'99), 1999
Proceedings of the 1999 IEEE International Conference on Acoustics, 1999
1998
IEEE Trans. Autom. Control., 1998
Performance analysis of a 2-D-multipulse amplitude modulation scheme for data hiding and watermarking of still images.
IEEE J. Sel. Areas Commun., 1998
Filtered error adaptive IIR algorithms and their application to active noise control.
Proceedings of the 1998 IEEE International Conference on Acoustics, 1998
The impact of channel coding on the performance of spatial watermarking for copyright protection.
Proceedings of the 1998 IEEE International Conference on Acoustics, 1998
1997
New schemes and theoretical analysis of the master-slave family of recursive identification algorithms.
Signal Process., 1997
An algorithm for interpolation with positive rational functions on the imaginary axis.
Autom., 1997