Pedro Comesaña Alfaro
Orcid: 0000-0001-5406-0066Affiliations:
- University of Vigo, atlanTTic Research Center, Spain
According to our database1,
Pedro Comesaña Alfaro
authored at least 65 papers
between 2003 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2022
A Critical Look into Quantization Table Generalization Capabilities of CNN-based Double JPEG Compression Detection.
Proceedings of the 30th European Signal Processing Conference, 2022
2017
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Inf. Forensics Secur., 2017
Derivation of the Asymptotic Eigenvalue Distribution for Causal 2D-AR Models under Upscaling.
CoRR, 2017
Random Matrix Theory for Modeling the Eigenvalue Distribution of Images Under Upscaling.
Proceedings of the Digital Communication. Towards a Smart and Secure Future Internet, 2017
2016
IEEE Trans. Circuits Syst. Video Technol., 2016
Proceedings of the Media Watermarking, 2016
Proceedings of the Media Watermarking, 2016
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016
V-DIFT: Vector-Based Dynamic Information Flow Tracking with Application to Locating Cryptographic Keys for Reverse Engineering.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images.
IEEE Trans. Inf. Forensics Secur., 2015
On the effectiveness of meta-detection for countering oracle attacks in watermarking.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
Proceedings of the 23rd European Signal Processing Conference, 2015
2014
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014
Proceedings of the Media Watermarking, 2014
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014
Transportation-theoretic image counterforensics to First Significant Digit histogram forensics.
Proceedings of the IEEE International Conference on Acoustics, 2014
Proceedings of the IEEE International Conference on Acoustics, 2014
2013
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013
Joint detection of full-frame linear filtering and JPEG compression in digital images.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013
Proceedings of the 15th IEEE International Workshop on Multimedia Signal Processing, 2013
Proceedings of the IEEE International Conference on Image Processing, 2013
Proceedings of the IEEE International Conference on Image Processing, 2013
Proceedings of the IEEE International Conference on Acoustics, 2013
2012
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Multimedia Operator Chain Topology and Ordering Estimation Based on Detection and Information Theoretic Tools.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012
2011
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011
Proceedings of the IEEE International Conference on Acoustics, 2011
Proceedings of the Document Recognition and Retrieval XVIII, 2011
2010
Asymptotically optimum universal watermark embedding and detection in the high-SNR regime.
IEEE Trans. Inf. Theory, 2010
2009
IEEE Trans. Inf. Forensics Secur., 2009
Proceedings of the International Conference on Image Processing, 2009
Proceedings of the 9th ACM Workshop on Digital Rights Management, 2009
2008
Asymptotically Optimum Universal One-Bit Watermarking for Gaussian Covertexts and Gaussian Attacks
CoRR, 2008
Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks.
Proceedings of the Security, 2008
2007
EURASIP J. Inf. Secur., 2007
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Proceedings of the 9th workshop on Multimedia & Security, 2007
Proceedings of the Digital Watermarking, 6th International Workshop, 2007
Modeling Gabor Coefficients via Generalized Gaussian Distributions for Face Recognition.
Proceedings of the International Conference on Image Processing, 2007
Proceedings of the International Conference on Image Processing, 2007
Proceedings of the IEEE International Conference on Acoustics, 2007
2006
IEEE Trans. Signal Process., 2006
IEEE Trans. Inf. Forensics Secur., 2006
IEEE Signal Process. Lett., 2006
Secret dither estimation in lattice-quantization data hiding: a set membership approach.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
2005
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the Digital Watermarking, 4th International Workshop, 2005
Proceedings of the Information Hiding, 7th International Workshop, 2005
Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis.
Proceedings of the Information Hiding, 7th International Workshop, 2005
Proceedings of the Communications and Multimedia Security, 2005
2004
Quantifying security leaks in spread spectrum data hiding: a game-theoretic approach.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
Blind iterative decoding of side-informed data hiding using the expectation-maximization algorithm.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
2003
Proceedings of the Digital Watermarking, Second International Workshop, 2003
Dither-modulation data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks.
Proceedings of the 2003 International Conference on Image Processing, 2003
Optimal strategies for spread-spectrum and quantized-projection image data hiding games with BER payoffs.
Proceedings of the 2003 International Conference on Image Processing, 2003