Primary tabs
“Are you threatening me? Towards smart detectors in watermarking”, in Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2014. spie14_2.0.pdf (430.73 KB)
, “A Benford-Fourier JPEG compression detector”, in IEEE International Conference on Image Processing (ICIP), Paris, France, 2014. benford_icip_rice_new.pdf (235.58 KB)
, “Do dummies pay off? Limits of dummy traffic protection in anonymous communications”, in Privacy Enhancing Technologies Symposium, 2014. pets14.pdf (421.61 KB) Matlab files used to perform the experiments in the paper. (5.55 KB)
, “Flat Fading Channel Estimation Based on Dirty Paper Coding”, in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Florence, Italy, 2014. icassp14_gdc_pca_fpg.pdf (154.64 KB)
, “A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems”, IEEE Transactions on Information Forensics and Security, 2014. lsdaTIFS14.pdf (1.64 MB)
, “Multiple JPEG compression detection by means of Benford-Fourier coefficients”, in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014.
, “A New Look At ML Step-Size Estimation for Scalar Costa Scheme Data Hiding”, in IEEE International Conference on Image Processing (ICIP), Paris, France, 2014. icip14.pdf (158.08 KB)
, “The optimal attack to histogram-based forensic detectors is simple(x)”, in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014, pp. 137-142. wifs14.pdf (265.04 KB)
, “Technical Report TSC/FPG/20032014: Performance Analysis of the Least Squares Disclosure Attack with Time-Varying User Behavior”, 2014. techrep.pdf (267.69 KB)
, “Technical Report TSC/SO/02052014: Derivation of the Mean Squared Error of the Least Squares Estimator in a Timed Pool Mix with Dummy Traffic”, 2014. trpets14.pdf (205.16 KB)
, “Technical Report UV/TSC/APU/02102014: Multivariate Ring Learning with Errors”, University of Vigo, 2014. TRMLWE2014.pdf (349.18 KB)
, “Transportation-theoretic image counterforensics to first significant digit histogram forensics”, in IEEE International Conference on Audio, Speech, and Signal Processing (ICASSP), Florence, Italy, 2014. cecilia_icassp2014.pdf (390.14 KB)
, “Understanding the Effects of Real-World Behavior in Statistical Disclosure Attacks”, in IEEE Workshop on Information Forensics and Security, 2014. wifs14.pdf (347.72 KB)
, “Coping with the enemy: Advances in adversary-aware signal processing”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Vancouver, Canada, 2013, pp. 8682–8686.
, “The flow fingerprinting game”, in IEEE International Workshop on Information Forensics and Security (WIFS), Guangzhou, China, 2013, pp. 97–102. wifs13_elices.pdf (534.58 KB)
, “Forensic analysis of full-frame linearly filtered JPEG images”, in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4517-4521. conotter.pdf (780.94 KB)
, “Fully Private Noninteractive Face Verification”, IEEE Transactions on Information Forensics and Security, vol. 8, no. 7, pp. 1101-1114, 2013. TPFJPGTIFS11-FullyPrivateFaceVerif.pdf (745.76 KB)
, “Joint detection of full-frame linear filtering and JPEG compression in digital images”, in IEEE International Workshop on Information Forensics and Security, Guangzhou, China, 2013. wifs13_jpeg.pdf (1.02 MB)
, “Least Squares Disclosure Attacks: User Profiling for Mix-based Anonymous Communication Systems”, University of Vigo, Vigo, 2013. lssda-main-tifs.pdf (516.78 KB)
, “Locating Tor hidden services through an interval-based traffic-correlation attack”, 2013 IEEE Conference on Communications and Network Security (CNS). Washington, DC, pp. 385–386, 2013. elices_cns.pdf (174.69 KB)
, “Meet the Family of Statistical Disclosure Attacks”, in GlobalSIP, 2013. main-globalsip.pdf (115.96 KB)
, “Near optimal detection of quantized signals and application to JPEG forensics”, 2013 IEEE International Workshop on Information Forensics and Security (WIFS). Guangzhou, China, pp. 168-173, 2013. wifs13_bianchi.pdf (293.74 KB)
, “Optimal counterforensics for histogram-based forensics”, in IEEE International Conference on Audio, Speech and Signal Processing, Vancouver, Canada, 2013, pp. 3048-3052. icassp13.pdf (84.89 KB) Source code (5.47 MB)
, “Privacy-Preserving Data Aggregation in Smart Metering Systems: An Overview”, IEEE Signal Processing Magazine, vol. 30, no. 2, pp. 75-86, 2013. smartmeteringspm2013.pdf (547.21 KB)
, “Quantization lattice estimation for multimedia forensics”, in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4452-4456. icip13.pdf (88.9 KB)
,