Search the dblp DataBase
Fernando Pérez-González :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
José M. Lago , Fernando Pérez-González Analytical Bounds on the Error Performance of the DVB-T System in Time-Invariant Channels. [Citation Graph (0, 0)][DBLP ] ICC (2), 2000, pp:651-655 [Conf ] Pedro Comesaña , Fernando Pérez-González , Félix Balado Optimal strategies for spread-spectrum and quantized-projection image data hiding games with BER payoffs. [Citation Graph (0, 0)][DBLP ] ICIP (2), 2003, pp:479-482 [Conf ] Vinicius Licks , Fabrício Ourique , Ramiro Jordan , Fernando Pérez-González The effect of the random jitter attack on the bit error rate performance of spatial domain image watermarking. [Citation Graph (0, 0)][DBLP ] ICIP (2), 2003, pp:455-458 [Conf ] Fernando Pérez-González , Félix Balado Quantized projection data hiding. [Citation Graph (0, 0)][DBLP ] ICIP (2), 2002, pp:889-892 [Conf ] Fernando Pérez-González , Pedro Comesaña , Félix Balado Dither-modulation data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks. [Citation Graph (0, 0)][DBLP ] ICIP (2), 2003, pp:503-506 [Conf ] Juan Ramón Hernández , Fernando Pérez-González Shedding More Light on Image Watermarks. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:191-207 [Conf ] Pedro Comesaña , Luis Pérez-Freire , Fernando Pérez-González Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2005, pp:146-160 [Conf ] Luis Pérez-Freire , Pedro Comesaña , Fernando Pérez-González Information-Theoretic Analysis of Security in Side-Informed Data Hiding. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2005, pp:131-145 [Conf ] Fernando Pérez-González , Félix Balado Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:87-105 [Conf ] Andrea Abrardo , Mauro Barni , Fernando Pérez-González , Carlos Mosquera Trellis-Coded Rational Dither Modulation for Digital Watermarking. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:351-360 [Conf ] Pedro Comesaña , Fernando Pérez-González , Félix Balado Optimal Data-Hiding Strategies for Games with BER Payoffs. [Citation Graph (0, 0)][DBLP ] IWDW, 2003, pp:101-116 [Conf ] Pedro Comesaña , Luis Pérez-Freire , Fernando Pérez-González The Return of the Sensitivity Attack. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:260-274 [Conf ] Fernando Pérez-González The Importance of Aliasing in Structured Quantization Index Modulation Data Hiding. [Citation Graph (0, 0)][DBLP ] IWDW, 2003, pp:1-17 [Conf ] José-Emilio Vila-Forcén , Sviatoslav Voloshynovskiy , Oleksiy J. Koval , Fernando Pérez-González , Thierry Pun Practical Data-Hiding: Additive Attacks Performance Analysis. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:244-259 [Conf ] Alberto Malvido , Fernando Pérez-González , Armando Cousiño A Novel Model for the Print-and-Capture Channel in 2D Bar Codes. [Citation Graph (0, 0)][DBLP ] MRCS, 2006, pp:627-634 [Conf ] Juan Ramón Hernández , Martin Amado , Fernando Pérez-González Novel techniques for watermark extraction in the DCT domain. [Citation Graph (0, 0)][DBLP ] NSIP, 1999, pp:331-335 [Conf ] Félix Balado , Fernando Pérez-González , Pedro Comesaña Blind iterative decoding of side-informed data hiding using the expectation-maximization algorithm. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:805-815 [Conf ] Pedro Comesaña , Fernando Pérez-González Quantifying security leaks in spread spectrum data hiding: a game-theoretic approach. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:592-601 [Conf ] Pedro Comesaña , Fernando Pérez-González , Frans M. Willems Applying Erez and Ten Brink's dirty paper codes to data hiding. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:298-307 [Conf ] Luis Pérez-Freire , Pedro Comesaña Alfaro , Fernando Pérez-González Detection in quantization-based watermarking: performance and security issues. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:721-733 [Conf ] Luis Pérez-Freire , Fernando Pérez-González Spread-spectrum vs. quantization-based data hiding: misconceptions and implications. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:341-352 [Conf ] Fernando Pérez-González , Carlos Mosquera , Mauro Barni , Andrea Abrardo Ensuring gain-invariance in high-rate data hiding. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:206-217 [Conf ] Oleksiy J. Koval , Sviatoslav Voloshynovskiy , Frédéric Deguillaume , Fernando Pérez-González , Thierry Pun Robustness improvement of known-host-state watermarking using host statistics. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:569-577 [Conf ] José-Emilio Vila-Forcén , Sviatoslav Voloshynovskiy , Oleksiy J. Koval , Fernando Pérez-González , Thierry Pun Worst-case additive attack against quantization-based data-hiding methods. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:136-146 [Conf ] Luis Pérez-Freire , Pedro Comesaña , Juan Ramón Troncoso-Pastoriza , Fernando Pérez-González Watermarking Security: A Survey. [Citation Graph (0, 0)][DBLP ] , 2006, v:, n:, pp:41-72 [Journal ] Juan Ramón Hernández , Martin Amado , Fernando Pérez-González DCT-domain watermarking techniques for still images: detector performance analysis and a new structure. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Image Processing, 2000, v:9, n:1, pp:55-68 [Journal ] Fernando Pérez-González Special section on "Signal Processing Techniques for Emerging Communications Applications". [Citation Graph (0, 0)][DBLP ] Signal Processing, 2001, v:81, n:8, pp:- [Journal ] Nuria González Prelcic , Fernando Pérez-González , M. Elena Domínguez Jiménez Wavelet packet-based subband adaptive equalization. [Citation Graph (0, 0)][DBLP ] Signal Processing, 2001, v:81, n:8, pp:1641-1662 [Journal ] Fernando Pérez-González , Juan Ramón Hernández , Félix Balado Approaching the capacity limit in image watermarking: a perspective on coding techniques for data hiding applications. [Citation Graph (0, 0)][DBLP ] Signal Processing, 2001, v:81, n:6, pp:1215-1238 [Journal ] Oleksiy J. Koval , Sviatoslav Voloshynovskiy , José-Emilio Vila-Forcén , Fernando Pérez-González , Frédéric Deguillaume , Thierry Pun Robustness improvement of known-host-state data-hiding using host statistics. [Citation Graph (0, 0)][DBLP ] Signal Processing, 2006, v:86, n:5, pp:1076-1088 [Journal ] Sviatoslav Voloshynovskiy , Thierry Pun , Jessica J. Fridrich , Fernando Pérez-González , N. Memon Security of data hiding technologies. [Citation Graph (0, 0)][DBLP ] Signal Processing, 2003, v:83, n:10, pp:2065-2067 [Journal ] Carlos Mosquera , Fernando Pérez-González Convergence analysis of the multiple-channel filtered-U recursive LMS algorithm for active noise control. [Citation Graph (0, 0)][DBLP ] Signal Processing, 2000, v:80, n:5, pp:849-856 [Journal ] Juan Ramón Hernández , J. M. Rodríguez , Fernando Pérez-González Improving the performance of spatial watermarking of images using channel coding. [Citation Graph (0, 0)][DBLP ] Signal Processing, 2000, v:80, n:7, pp:1261-1279 [Journal ] Luis Pérez-Freire , Fernando Pérez-González , Teddy Furon On achievable security levels for lattice data hiding in the known message attack scenario. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2006, pp:68-79 [Conf ] Juan Ramón Troncoso-Pastoriza , Fernando Pérez-González Zero-knowledge watermark detector robust to sensitivity attacks. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2006, pp:97-107 [Conf ] Pedro Comesaña , Fernando Pérez-González On the capacity of stegosystems. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2007, pp:15-24 [Conf ] Oleksiy J. Koval , Sviatoslav Voloshynovskiy , Fernando Pérez-González , Frédéric Deguillaume , Thierry Pun Quantization-based watermarking performance improvement using host statistics: AWGN attack case. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2004, pp:35-39 [Conf ] Videosurveillance and privacy: covering the two sides of the mirror with DRM. [Citation Graph (, )][DBLP ] Benford's Lawin Image Processing. [Citation Graph (, )][DBLP ] On a Watermarking Scheme in the Logarithmic Domain and its Perceptual Advantages. [Citation Graph (, )][DBLP ] Modeling Gabor Coefficients via Generalized Gaussian Distributions for Face Recognition. [Citation Graph (, )][DBLP ] Statistical Analysis of a Linear Algebra Asymmetricwatermarking Scheme. [Citation Graph (, )][DBLP ] Modeling magnitudes of Gabor coefficients: The beta-Rayleigh distribution. [Citation Graph (, )][DBLP ] Skewed log-stable model for natural images pixel block-variance. [Citation Graph (, )][DBLP ] Perfomance analysis of the Fridrich-Goljan self-embedding authentication method. [Citation Graph (, )][DBLP ] Exploiting Security Holes in Lattice Data Hiding. [Citation Graph (, )][DBLP ] Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding. [Citation Graph (, )][DBLP ] Dither Modulation in the Logarithmic Domain. [Citation Graph (, )][DBLP ] Model-based steganalysis using invariant features. [Citation Graph (, )][DBLP ] Search in 0.030secs, Finished in 0.032secs