Export 235 results:
Author Title Type [ Year] Filters: Author is Fernando Pérez-González [Clear All Filters]
“Flat Fading Channel Estimation Based on Dirty Paper Coding”, in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Florence, Italy, 2014. icassp14_gdc_pca_fpg.pdf (154.64 KB)
, “A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems”, IEEE Transactions on Information Forensics and Security, 2014. lsdaTIFS14.pdf (1.64 MB)
, “Multiple JPEG compression detection by means of Benford-Fourier coefficients”, in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014.
, “A New Look At ML Step-Size Estimation for Scalar Costa Scheme Data Hiding”, in IEEE International Conference on Image Processing (ICIP), Paris, France, 2014. icip14.pdf (158.08 KB)
, “The optimal attack to histogram-based forensic detectors is simple(x)”, in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014, pp. 137-142. wifs14.pdf (265.04 KB)
, “Technical Report TSC/FPG/20032014: Performance Analysis of the Least Squares Disclosure Attack with Time-Varying User Behavior”, 2014. techrep.pdf (267.69 KB)
, “Technical Report TSC/SO/02052014: Derivation of the Mean Squared Error of the Least Squares Estimator in a Timed Pool Mix with Dummy Traffic”, 2014. trpets14.pdf (205.16 KB)
, “Technical Report UV/TSC/APU/02102014: Multivariate Ring Learning with Errors”, University of Vigo, 2014. TRMLWE2014.pdf (349.18 KB)
, “Transportation-theoretic image counterforensics to first significant digit histogram forensics”, in IEEE International Conference on Audio, Speech, and Signal Processing (ICASSP), Florence, Italy, 2014. cecilia_icassp2014.pdf (390.14 KB)
, “Understanding the Effects of Real-World Behavior in Statistical Disclosure Attacks”, in IEEE Workshop on Information Forensics and Security, 2014. wifs14.pdf (347.72 KB)
, “Forensic detection of processing operator chains: recovering the history of filtered JPEG images”, IEEE Transactions on Information Forensics and Security, 2015. tifs.pdf (2.46 MB)
, “Multivariate Lattices for Encrypted Image Processing”, in IEEE International Conference on Acoustics, Speech and Signal Processing, Brisbane, Australia, 2015. PedrouzoICASSP2015.pdf (348.56 KB)
, “An SVD Approach to Forensic Image Resampling Detection”, in EUSIPCO, 2015, pp. 2112-2116. eusipco15_dvazquez_pcomesan_fperez.pdf (169.61 KB)
, “Data Hiding Robust to Mobile Communication Vocoders”, IEEE Transactions on Multimedia, vol. 18, no. 12, pp. 2345-2357, 2016. TMM2599149.pdf (3.04 MB)
, “Design of pool mixes against profiling attacks in real conditions”, IEEE/ACM Transactions on Networking, vol. 24, no. 6, pp. 3662-3675, 2016. TNET2547391_author_version.pdf (1.96 MB)
, “Dynamic Privacy-Preserving Genomic Susceptibility Testing”, in ACM Workshop on Information Hiding and Multimedia Security, 2016, pp. 45-50. IHMMSec2016-GenomicPrivSusceptibility.pdf (359.18 KB)
, “Fast Sequential Forensic Detection of Camera Fingerprint”, in IEEE International Conference on Image Processing (ICIP), 2016. perez.pdf (325.29 KB)
, “Forensics of high quality and nearly identical JPEG image recompression”, in ACM Workshop on Information Hiding and Multimedia Security, 2016. HQ_multipleJPEG.pdf (1.33 MB)
, “Image denoising in the encrypted domain”, in IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, UAE, 2016. PTP16_WIFS16.pdf (527.76 KB)
, , , “Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms”, in ACM Conference on Computer and Communications Security (CCS), 2017. CCSmain.pdf (1.82 MB)
, “Design of projection matrices for PRNU compression”, in 2017 IEEE Workshop on Information Forensics and Security (WIFS), 2017, pp. 1-6. 2017_prnu_projection.pdf (689.14 KB)
, “Filter design for delay-based anonymous communications”, in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2017. ICASSPmain.pdf (382.42 KB)
, “Is Geo-Indistinguishability what you are looking for?”, in Workshop on Privacy in the Electronic Society (WPES), 2017. 1709.06318.pdf (822.66 KB)
,