Fernando Pérez-González

Orcid: 0000-0002-0568-1373

Affiliations:
  • University of Vigo, School of Telecommunication Engineering, Spain
  • University of New Mexico, Albuquerque, NM, USA


According to our database1, Fernando Pérez-González authored at least 217 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Awards

IEEE Fellow

IEEE Fellow 2016, "For contributions to multimedia security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Adaptive Method for Camera Attribution Under Complex Radial Distortion Corrections.
IEEE Trans. Inf. Forensics Secur., 2024

Exploring Federated Learning Dynamics for Black-and-White-Box DNN Traitor Tracing.
CoRR, 2024

Shedding Light on some Leaks in PRNU-based Source Attribution.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024

2023
Information Forensics and Security: A quarter-century-long journey.
IEEE Signal Process. Mag., July, 2023

Source camera attribution via PRNU emphasis: Towards a generalized multiplicative model.
Signal Process. Image Commun., May, 2023

Towards Traitor Tracing in Black-and-White-Box DNN Watermarking with Tardos-Based Codes.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023

Exploiting PRNU and Linear Patterns in Forensic Camera Attribution under Complex Lens Distortion Correction.
Proceedings of the IEEE International Conference on Acoustics, 2023

Introducing the TRUMPET project: TRUstworthy Multi-site Privacy Enhancing Technologies.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
Gpu-Accelerated Sift-Aided Source Identification of Stabilized Videos.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

A Critical Look into Quantization Table Generalization Capabilities of CNN-based Double JPEG Compression Detection.
Proceedings of the 30th European Signal Processing Conference, 2022

Secure Collaborative Camera Attribution✱.
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022

2021
On the information leakage quantification of camera fingerprint estimates.
EURASIP J. Inf. Secur., 2021

DNN Watermarking: Four Challenges and a Funeral.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

2020
Video Integrity Verification and GOP Size Estimation Via Generalized Variation of Prediction Footprint.
IEEE Trans. Inf. Forensics Secur., 2020

Temporal Localization of Non-Static Digital Videos Using the Electrical Network Frequency.
IEEE Signal Process. Lett., 2020

Adam and the Ants: On the Influence of the Optimization Algorithm on the Detectability of DNN Watermarks.
Entropy, 2020

Multiquadratic Rings and Walsh-Hadamard Transforms for Oblivious Linear Function Evaluation.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

PRNU-leaks: facts and remedies.
Proceedings of the 28th European Signal Processing Conference, 2020

2019
Improving PRNU Compression Through Preprocessing, Quantization, and Coding.
IEEE Trans. Inf. Forensics Secur., 2019

Revisiting Multivariate Ring Learning with Errors and its Applications on Lattice-based Cryptography.
IACR Cryptol. ePrint Arch., 2019

MPEG-2 Prediction Residue Analysis.
CoRR, 2019

Dynamic attribute-based privacy-preserving genomic susceptibility testing.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Revisiting Multivariate Lattices for Encrypted Signal Processing.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

Prediction Residue Analysis in MPEG-2 Double Compressed Video Sequences.
Proceedings of the 27th European Signal Processing Conference, 2019

Rethinking Location Privacy for Unknown Mobility Behaviors.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2018
A Tabula Rasa Approach to Sporadic Location Privacy.
CoRR, 2018

Camera Attribution Forensic Analyzer in the Encrypted Domain.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018

Putting the PRNU Model in Reverse Gear: Findings with Synthetic Signals.
Proceedings of the 26th European Signal Processing Conference, 2018

2017
A Random Matrix Approach to the Forensic Analysis of Upscaled Images.
IEEE Trans. Inf. Forensics Secur., 2017

Smart Detection of Line-Search Oracle Attacks.
IEEE Trans. Inf. Forensics Secur., 2017

Number Theoretic Transforms for Secure Signal Processing.
IEEE Trans. Inf. Forensics Secur., 2017

Statistical Detection of JPEG Traces in Digital Images in Uncompressed Formats.
IEEE Trans. Inf. Forensics Secur., 2017

Multivariate Cryptosystems for Secure Processing of Multidimensional Signals.
CoRR, 2017

Derivation of the Asymptotic Eigenvalue Distribution for Causal 2D-AR Models under Upscaling.
CoRR, 2017

On the the design of optimal location privacy-preserving mechanisms.
CoRR, 2017

Is Geo-Indistinguishability What You Are Looking for?
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

Design of projection matrices for PRNU compression.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Random Matrix Theory for Modeling the Eigenvalue Distribution of Images Under Upscaling.
Proceedings of the Digital Communication. Towards a Smart and Secure Future Internet, 2017

Secure genomic susceptibility testing based on lattice encryption.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

Filter design for delay-based anonymous communications.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Design of Pool Mixes Against Profiling Attacks in Real Conditions.
IEEE/ACM Trans. Netw., 2016

Data Hiding Robust to Mobile Communication Vocoders.
IEEE Trans. Multim., 2016

On Ideal Lattices over the Tensor Product of Number Fields and Ring Learning with Errors over Multivariate Rings.
CoRR, 2016

Report on Dirty Paper Coding Estimation with multidimensional lattices.
CoRR, 2016

IEEE Access Special Section Editorial: Latest Advances and Emerging Applications of Data Hiding.
IEEE Access, 2016

Image denoising in the encrypted domain.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Forensics of High Quality and Nearly Identical JPEG Image Recompression.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

Dynamic Privacy-Preserving Genomic Susceptibility Testing.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

Fast sequential forensic detection of camera fingerprint.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

2015
Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images.
IEEE Trans. Inf. Forensics Secur., 2015

Fast sequential forensic camera identification.
CoRR, 2015

On the effectiveness of meta-detection for countering oracle attacks in watermarking.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Multivariate lattices for encrypted image processing.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

An SVD approach to forensic image resampling detection.
Proceedings of the 23rd European Signal Processing Conference, 2015

2014
A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems.
IEEE Trans. Inf. Forensics Secur., 2014

Multiple JPEG compression detection by means of Benford-Fourier coefficients.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

Understanding the effects of real-world behavior in statistical disclosure attacks.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

The optimal attack to histogram-based forensic detectors is simple(x).
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

Do Dummies Pay Off? Limits of Dummy Traffic Protection in Anonymous Communications.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

Are you threatening me?: Towards smart detectors in watermarking.
Proceedings of the Media Watermarking, 2014

A Benford-Fourier JPEG compression detector.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

A new look at ML step-size estimation for Scalar Costa scheme data hiding.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Transportation-theoretic image counterforensics to First Significant Digit histogram forensics.
Proceedings of the IEEE International Conference on Acoustics, 2014

Flat fading channel estimation based on Dirty Paper Coding.
Proceedings of the IEEE International Conference on Acoustics, 2014

2013
Fully Private Noninteractive Face Verification.
IEEE Trans. Inf. Forensics Secur., 2013

Secure Signal Processing in the Cloud: Enabling Technologies for Privacy-Preserving Multimedia Cloud Processing.
IEEE Signal Process. Mag., 2013

Privacy-Preserving Data Aggregation in Smart Metering Systems: An Overview.
IEEE Signal Process. Mag., 2013

Exploiting Geometrical Structure for Forensic Applications of Timing Inference Channels.
Int. J. Digit. Crime Forensics, 2013

A highly optimized flow-correlation attack.
CoRR, 2013

Linking Correlated Network Flows through Packet Timing: a Game-Theoretic Approach.
CoRR, 2013

Set-membership identification of resampled signals.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

The flow fingerprinting game.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

Joint detection of full-frame linear filtering and JPEG compression in digital images.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

Near optimal detection of quantized signals and application to JPEG forensics.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

Taking advantage of source correlation in forensic analysis.
Proceedings of the 15th IEEE International Workshop on Multimedia Signal Processing, 2013

Forensic analysis of full-frame linearly filtered JPEG images.
Proceedings of the IEEE International Conference on Image Processing, 2013

Quantization lattice estimation for multimedia forensics.
Proceedings of the IEEE International Conference on Image Processing, 2013

Coping with the enemy: Advances in adversary-aware signal processing.
Proceedings of the IEEE International Conference on Acoustics, 2013

Optimal counterforensics for histogram-based forensics.
Proceedings of the IEEE International Conference on Acoustics, 2013

Meet the family of statistical disclosure attacks.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

Locating Tor hidden services through an interval-based traffic-correlation attack.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Overlay Cognitive Transmission in a Multicarrier Broadcast Network with Dominant Line of Sight Reception.
IEEE Trans. Wirel. Commun., 2012

An Adaptive Feedback Canceller for Full-Duplex Relays Based on Spectrum Shaping.
IEEE J. Sel. Areas Commun., 2012

A Least Squares approach to user profiling in pool mix-based anonymous communication systems.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Fingerprinting a flow of messages to an anonymous server.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Overlay spectrum reuse in a multicarrier broadcast network: Single receiver analysis.
Proceedings of the 13th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2012

Overlay spectrum reuse in a multicarrier broadcast network: Coverage analysis.
Proceedings of the 13th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2012

Understanding Statistical Disclosure: A Least Squares Approach.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Multimedia Operator Chain Topology and Ordering Estimation Based on Detection and Information Theoretic Tools.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Fully homomorphic faces.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

2011
Secure Adaptive Filtering.
IEEE Trans. Inf. Forensics Secur., 2011

Gain-Invariant Dirty Paper Coding for Hierarchical OFDM.
IEEE Trans. Commun., 2011

Prefilter design for forensic resampling estimation.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

Fingerprinting Tor's hidden service log files using a timing channel.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

Exposing Original and Duplicated Regions Using SIFT Features and Resampling Traces.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

Witsenhausen's Counterexample and Its Links with Multimedia Security Problems.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

A Dirty Paper Scheme for Hierarchical OFDM.
Proceedings of IEEE International Conference on Communications, 2011

Efficient protocols for secure adaptive filtering.
Proceedings of the IEEE International Conference on Acoustics, 2011

Weber's law-based side-informed data hiding.
Proceedings of the IEEE International Conference on Acoustics, 2011

A new method for perspective correction of document images.
Proceedings of the Document Recognition and Retrieval XVIII, 2011

On the co-existence of primary and secondary transmitters in a broadcast network.
Proceedings of the CogART 2011, 2011

2010
Leaving timing-channel fingerprints in hidden service log files.
Digit. Investig., 2010

CryptoDSPs for Cloud Privacy.
Proceedings of the Web Information Systems Engineering - WISE 2010 Workshops, 2010

Two-dimensional statistical test for the presence of almost cyclostationarity on images.
Proceedings of the International Conference on Image Processing, 2010

On the role of differentiation for resampling detection.
Proceedings of the International Conference on Image Processing, 2010

A new model for Gabor coefficients' magnitude in face recognition.
Proceedings of the IEEE International Conference on Acoustics, 2010

2009
Spread-spectrum watermarking security.
IEEE Trans. Inf. Forensics Secur., 2009

Performance analysis of Fridrich-Goljan self-embedding authentication method.
IEEE Trans. Inf. Forensics Secur., 2009

High-Rate Data-Hiding Robust to Linear Filtering for Colored Hosts.
EURASIP J. Inf. Secur., 2009

An extended analysis of discrete fourier tranform - rational dither modulation for non-white hosts.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Model-based steganalysis using invariant features.
Proceedings of the Media Forensics and Security I, 2009

Skewed log-stable model for natural images pixel block-variance.
Proceedings of the International Conference on Image Processing, 2009

Modeling magnitudes of Gabor coefficients: The beta-Rayleigh distribution.
Proceedings of the International Conference on Image Processing, 2009

Perfomance analysis of the Fridrich-Goljan self-embedding authentication method.
Proceedings of the International Conference on Image Processing, 2009

Videosurveillance and privacy: covering the two sides of the mirror with DRM.
Proceedings of the 9th ACM Workshop on Digital Rights Management, 2009

2008
Quantization-Based Data Hiding Robust to Linear-Time-Invariant Filtering.
IEEE Trans. Inf. Forensics Secur., 2008

Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack.
IEEE Trans. Inf. Forensics Secur., 2008

Quantization-Based Methods: Additive Attacks Performance Analysis.
Trans. Data Hiding Multim. Secur., 2008

Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding.
Proceedings of the Information Hiding, 10th International Workshop, 2008

2007
Efficient Zero-Knowledge Watermark Detection with Improved Robustness to Sensitivity Attacks.
EURASIP J. Inf. Secur., 2007

Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks.
EURASIP J. Inf. Secur., 2007

Efficient non-interactive zero-knowledge watermark detector robust to sensitivity attacks.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Security of spread-spectrum-based data hiding.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Two different approaches for attacking BOWS.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

A novel interpretation of content authentication.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

On distortion measures associated to random desynchronization attacks.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

On the capacity of stegosystems.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Dither Modulation in the Logarithmic Domain.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Exploiting Security Holes in Lattice Data Hiding.
Proceedings of the Information Hiding, 9th International Workshop, 2007

Benford's Lawin Image Processing.
Proceedings of the International Conference on Image Processing, 2007

Modeling Gabor Coefficients via Generalized Gaussian Distributions for Face Recognition.
Proceedings of the International Conference on Image Processing, 2007

On a Watermarking Scheme in the Logarithmic Domain and its Perceptual Advantages.
Proceedings of the International Conference on Image Processing, 2007

Statistical Analysis of a Linear Algebra Asymmetricwatermarking Scheme.
Proceedings of the International Conference on Image Processing, 2007

Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking.
Proceedings of the IEEE International Conference on Acoustics, 2007

2006
On distortion-compensated dither modulation data-hiding with repetition coding.
IEEE Trans. Signal Process., 2006

An accurate analysis of scalar quantization-based data hiding.
IEEE Trans. Inf. Forensics Secur., 2006

Security of Lattice-Based Data Hiding Against the Known Message Attack.
IEEE Trans. Inf. Forensics Secur., 2006

Watermarking Security: A Survey.
Trans. Data Hiding Multim. Secur., 2006

The impact of the cropping attack on scalar STDM data hiding.
IEEE Signal Process. Lett., 2006

Robustness improvement of known-host-state data-hiding using host statistics.
Signal Process., 2006

High-rate quantization data hiding robust to arbitrary linear filtering attacks.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Secret dither estimation in lattice-quantization data hiding: a set membership approach.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

The blind Newton sensitivity attack.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

A Novel Model for the Print-and-Capture Channel in 2D Bar Codes.
Proceedings of the Multimedia Content Representation, 2006

Zero-knowledge watermark detector robust to sensitivity attacks.
Proceedings of the 8th workshop on Multimedia & Security, 2006

On achievable security levels for lattice data hiding in the known message attack scenario.
Proceedings of the 8th workshop on Multimedia & Security, 2006

2005
Rational dither modulation: a high-rate data-hiding method invariant to gain attacks.
IEEE Trans. Signal Process., 2005

Pushing science into signal processing [my turn].
IEEE Signal Process. Mag., 2005

Worst-case additive attack against quantization-based data-hiding methods.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Ensuring gain-invariance in high-rate data hiding.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Spread-spectrum vs. quantization-based data hiding: misconceptions and implications.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Detection in quantization-based watermarking: performance and security issues.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Robustness improvement of known-host-state watermarking using host statistics.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Applying Erez and Ten Brink's dirty paper codes to data hiding.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Practical Data-Hiding: Additive Attacks Performance Analysis.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

The Return of the Sensitivity Attack.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

Trellis-Coded Rational Dither Modulation for Digital Watermarking.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

Information-Theoretic Analysis of Security in Side-Informed Data Hiding.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Angle QIM: a novel watermark embedding scheme robust against amplitude scaling distortions.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005

An Exact Expression for the Bit Error Probability in Angle QIM Watermarking Under Simultaneous Amplitude Scaling and AWGN Attacks.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005

Data-hiding with partially available side information.
Proceedings of the 13th European Signal Processing Conference, 2005

2004
Estimation of Road Vehicle Speed Using Two Omnidirectional Microphones: A Maximum Likelihood Approach.
EURASIP J. Adv. Signal Process., 2004

Quantifying security leaks in spread spectrum data hiding: a game-theoretic approach.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Blind iterative decoding of side-informed data hiding using the expectation-maximization algorithm.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Worst case additive attack against quantization-based watermarking techniques.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004

Rational dither modulation: a novel data-hiding method robust to value-metric scaling attacks.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004

Revealing the true achievable rates of scalar Costa scheme.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004

Quantization-based watermarking performance improvement using host statistics: AWGN attack case.
Proceedings of the 6th workshop on Multimedia & Security, 2004

Bias analysis and removal of a microphone array based road traffic speed estimator.
Proceedings of the 2004 12th European Signal Processing Conference, 2004

Spread spectrum watermarking for real images: Is everything so hopeless?
Proceedings of the 2004 12th European Signal Processing Conference, 2004

2003
Performance analysis of existing and new methods for data hiding with known-host information in additive channels.
IEEE Trans. Signal Process., 2003

Subband hyperstable adaptive IIR filters.
IEEE Trans. Circuits Syst. II Express Briefs, 2003

Security of data hiding technologies.
Signal Process., 2003

Visible encryption: using paper as a secure channel.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

Hexagonal quantizers are not optimal for 2D data hiding.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

The Importance of Aliasing in Structured Quantization Index Modulation Data Hiding.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

Optimal Data-Hiding Strategies for Games with BER Payoffs.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

Dither-modulation data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks.
Proceedings of the 2003 International Conference on Image Processing, 2003

The effect of the random jitter attack on the bit error rate performance of spatial domain image watermarking.
Proceedings of the 2003 International Conference on Image Processing, 2003

Optimal strategies for spread-spectrum and quantized-projection image data hiding games with BER payoffs.
Proceedings of the 2003 International Conference on Image Processing, 2003

2002
Analysis of pilot-based synchronization algorithms for watermarking of still images.
Signal Process. Image Commun., 2002

Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation.
Proceedings of the Information Hiding, 5th International Workshop, 2002

Improving data hiding performance by using quantization in a projected domain.
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002

Provably or probably robust data hiding?
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002

Quantized projection data hiding.
Proceedings of the 2002 International Conference on Image Processing, 2002

Road vehicle speed estimation from a two-microphone array.
Proceedings of the IEEE International Conference on Acoustics, 2002

Analysis of the prewhitened constant modulus cost function.
Proceedings of the IEEE International Conference on Acoustics, 2002

2001
Adaptive lattice IIR filtering revisited: convergence issues and new algorithms with improved stability properties.
IEEE Trans. Signal Process., 2001

Wavelet packet-based subband adaptive equalization.
Signal Process., 2001

Approaching the capacity limit in image watermarking: a perspective on coding techniques for data hiding applications.
Signal Process., 2001

Special section on "Signal Processing Techniques for Emerging Communications Applications".
Signal Process., 2001

Efficient reinitialization of the prewhitened constant modulus algorithm.
IEEE Commun. Lett., 2001

Digital watermarking for copyright protection: a communications perspective.
IEEE Commun. Mag., 2001

Algebraic solution to the robust SPR problem for two polynomials.
Autom., 2001

On the strengthened robust SPR problem for discrete-time systems.
Autom., 2001

Coding at the sample level for data hiding: turbo and concatenated codes.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

2000
DCT-domain watermarking techniques for still images: detector performance analysis and a new structure.
IEEE Trans. Image Process., 2000

Convergence analysis of the multiple-channel filtered-U recursive LMS algorithm for active noise control.
Signal Process., 2000

Improving the performance of spatial watermarking of images using channel coding.
Signal Process., 2000

Analytical Bounds on the Error Performance of the DVB-T System in Time-Invariant Channels.
Proceedings of the 2000 IEEE International Conference on Communications: Global Convergence Through Communications, 2000

Misconvergence and stabilization of adaptive IIR lattice filters.
Proceedings of the IEEE International Conference on Acoustics, 2000

1999
Hyperstable adaptive IIR algorithms with polyphase structures: analysis and design.
IEEE Trans. Signal Process., 1999

Some remarks on the lattice form of the Steiglitz-McBride iteration.
IEEE Signal Process. Lett., 1999

The robust SPR problem: Design algorithms and new applications.
Signal Process., 1999

Statistical analysis of watermarking schemes for copyright protection of images.
Proc. IEEE, 1999

Novel techniques for watermark extraction in the DCT domain.
Proceedings of the IEEE-EURASIP Workshop on Nonlinear Signal and Image Processing (NSIP'99), 1999

Hyperstable polyphase adaptive IIR filters.
Proceedings of the 1999 IEEE International Conference on Acoustics, 1999

1998
On the bias of the modified output error algorithm.
IEEE Trans. Autom. Control., 1998

Performance analysis of a 2-D-multipulse amplitude modulation scheme for data hiding and watermarking of still images.
IEEE J. Sel. Areas Commun., 1998

Shedding More Light on Image Watermarks.
Proceedings of the Information Hiding, 1998

Filtered error adaptive IIR algorithms and their application to active noise control.
Proceedings of the 1998 IEEE International Conference on Acoustics, 1998

The impact of channel coding on the performance of spatial watermarking for copyright protection.
Proceedings of the 1998 IEEE International Conference on Acoustics, 1998

1997
Editorial.
Signal Process., 1997

New schemes and theoretical analysis of the master-slave family of recursive identification algorithms.
Signal Process., 1997

An algorithm for interpolation with positive rational functions on the imaginary axis.
Autom., 1997


  Loading...