“ArboX, a Contribution to Digital Library”, in International Conference on Engineering and Computer Education (ICECE), Rio de Janeiro, Brazil, 1999.
, “A Two-Stage Codebook Building Method Using Fast WAN”, in International Conference on Image Analysis and Processing (ICIAP), Venice, Italy, 1999, pp. 1047–1050.
, “ArboX, a Contribution to Digital Library”, Computer Applications in Engineering Education, vol. 8, pp. 216–220, 2000.
, “Approaching the Capacity Limit in Image Watermarking: A Perspective on Coding Techniques for Data Hiding Applications”, Signal Processing, vol. 81, pp. 1215–1238, 2001.
, “Coding at the Sample Level for Data Hiding: Turbo and Concatenated Codes”, in Security and Watermarking of Multimedia Contents, San José, USA, 2001, vol. 4314, pp. 532–543.
, “Turbo Coding for Sample-Level Watermarking in the DCT Domain”, in IEEE International Conference on Image Processing (ICIP), Thessaloniki, Greece, 2001, pp. 1003–1006.
, “Improving Data Hiding Performance by Using Quantization in a Projected Domain”, in IEEE International Conference on Multimedia and Expo (ICME), Lausanne, Switzerland, 2002.
, “Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation”, in International Workshop on Information Hiding (IH), Noorwijkerhout, The Netherlands, 2002.
, “Provably or Probably Robust Data Hiding?”, in IEEE International Conference on Multimedia and Expo (ICME), Lausanne, Switzerland, 2002.
, “Quantized Projection Data Hiding”, in IEEE International Conference on Image Processing (ICIP), Rochester (NY), USA, 2002.
, “Digital image data hiding using side information”, University of Vigo, Spain, 2003.
, “Dither-Modulation Data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks.”, in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003. icip03a.pdf (145.04 KB)
, “Hexagonal Quantizers are not Optimal for 2-D Data Hiding”, in Security and Watermarking of Multimedia Contents, Santa Clara, USA, 2003, vol. 5020.
, “Optimal Data-Hiding Strategies for Games with BER Payoffs”, in International Workshop on Digital Watermarking (IWDW), 2003, vol. 2939 / 2004, pp. 101-116. iwdw03.ps (499.03 KB)
, “Optimal Strategies for Spread-Spectrum and Quantized-Projection image data hiding games with BER Payoffs”, in IEEE International Conference on Image Processing (ICIP), Barcelona, Spain, 2003. icip03b.pdf (142.96 KB)
, “Performance Analysis of Existing and New Methods for Data Hiding with Known-Host Information in Additive Channels”, IEEE Transactions on Signal Processing, vol. 51, pp. 960-980, 2003.
, “Blind iterative decoding of side-informed data hiding using the Expectation-Maximization algorithm”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 805-815. spie04em.pdf (434.03 KB)
, “Blind Turbo Decoding of Side-Informed Data Hiding Using Iterative Channel Estimation”, in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Lisboa, 2004.
, “On distortion-compensated Dither Modulation data-hiding with repetition coding”, IEEE Transactions on Signal Processing, vol. 54, pp. 585-600, 2006. dcdm_uvigo05.pdf (311.95 KB)
, “On Distortion Measures Associated to Random Desynchronization Attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, “A Novel Interpretation of Content Authentication”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007. spie07authentication.pdf (179.34 KB)
,