Export 36 results:
Author Title Type [ Year] Filters: Author is Juan Ramón Troncoso-Pastoriza [Clear All Filters]
“Watermarking security: a survey”, Transactions on Data Hiding and Multimedia Security I, vol. 4300, pp. 41-72, 2006. survey06security.pdf (268.87 KB)
, “Zero-Knowledge watermark detector robust to sensitivity attacks”, in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 97-107.
, “Efficient Non-Interactive Zero-Knowledge Watermark Detector Robust to Sensitivity Attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, “Efficient Zero-Knowledge Watermark Detection with Improved Robustness to Sensitivity Attacks”, EURASIP Journal on Information Security, 2007.
, “Privacy Preserving Error Resilient DNA Searching through Oblivious Automata”, in ACM Conference on Computer and Communications Security (CCS), Alexandria, Virginia, USA, 2007, pp. 519–528.
, “A Secure Multidimensional Point Inclusion Protocol”, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, Texas, USA, 2007, pp. 109–120.
, “Secure Direct and Iterative Protocols for Solving Systems of Linear Equations”, in Signal Processing in the Encrypted Domain (SPEED) Workshop, Lausanne, Switzerland, 2009, pp. 122–141. secure_sle_speedws09.pdf (193.97 KB)
, “Skewed Log-Stable model for natural images pixel block-variance”, in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009.
, “Videosurveillance and privacy: covering the two sides of the mirror with DRM”, in ACM Workshop on Digital Rights Management (DRM), Chicago, IL, USA, 2009. drm18-troncoso.pdf (417.17 KB)
, “CryptoDSPs for Cloud Privacy”, in International Workshop on Cloud Information System Engineering (CISE), Hong Kong, China, 2010, vol. 6724.
, “A new model for Gabor Coefficients' Magnitude in Face Recognition”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Dallas, USA, 2010.
, “Secure and Private Medical Clouds using Encrypted Processing”, in Virtual Physiological Human (VPH), Brussels, Belgium, 2010.
, “Efficient Protocols for Secure Adaptive Filtering”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prage, Czech Republic, 2011, pp. 5860-5863. secure_adaptive_filteringICASSP2011.pdf (115.55 KB)
, “Encrypted Domain Processing for Cloud Privacy: Concept and Practical Experience”, in International Conference on Cloud Computing and Services Science (CLOSER), Noordwijkerhout, The Netherlands, 2011.
, “Secure Adaptive Filtering”, IEEE Transactions on Information Forensics and Security, vol. 6, pp. 469 -485, 2011. TPPGTIFS11-Secure_Adaptive_Filtering.pdf (396.27 KB)
, “Encrypted Domain Processing for Signal Processing Applications”, University of Vigo, Vigo, 2012. jr_troncoso_thesis.pdf (4.44 MB)
, “Fully Homomorphic Faces”, in IEEE International Conference on Image Processing (ICIP), Lake Buena Vista, Florida, USA, 2012. cryptofaces.pdf (213.56 KB)
, “Fully Private Noninteractive Face Verification”, IEEE Transactions on Information Forensics and Security, vol. 8, no. 7, pp. 1101-1114, 2013. TPFJPGTIFS11-FullyPrivateFaceVerif.pdf (745.76 KB)
, “Privacy-Preserving Data Aggregation in Smart Metering Systems: An Overview”, IEEE Signal Processing Magazine, vol. 30, no. 2, pp. 75-86, 2013. smartmeteringspm2013.pdf (547.21 KB)
, “Secure Signal Processing in the Cloud: enabling technologies for privacy-preserving multimedia cloud processing”, IEEE Signal Processing Magazine, vol. 30, no. 2, pp. 29-41, 2013. cloudspm2013.pdf (965.61 KB)
, “Bootstrap-based Proxy Reencryption for Private Multi-user Computing”, in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014. TroncosoCaputo-BootstrappingMultiKey.pdf (795.89 KB)
, “Technical Report UV/TSC/APU/02102014: Multivariate Ring Learning with Errors”, University of Vigo, 2014. TRMLWE2014.pdf (349.18 KB)
, “Multivariate Lattices for Encrypted Image Processing”, in IEEE International Conference on Acoustics, Speech and Signal Processing, Brisbane, Australia, 2015. PedrouzoICASSP2015.pdf (348.56 KB)
, “Co-creating Security-and-Privacy-by-Design Systems”, in International Conference on Availability, Reliability and Security (ARES), Salzburg, Germany, 2016, pp. 768-775.
, “Dynamic Privacy-Preserving Genomic Susceptibility Testing”, in ACM Workshop on Information Hiding and Multimedia Security, 2016, pp. 45-50. IHMMSec2016-GenomicPrivSusceptibility.pdf (359.18 KB)
,