The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Fernando Pérez-González: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. José M. Lago, Fernando Pérez-González
    Analytical Bounds on the Error Performance of the DVB-T System in Time-Invariant Channels. [Citation Graph (0, 0)][DBLP]
    ICC (2), 2000, pp:651-655 [Conf]
  2. Pedro Comesaña, Fernando Pérez-González, Félix Balado
    Optimal strategies for spread-spectrum and quantized-projection image data hiding games with BER payoffs. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2003, pp:479-482 [Conf]
  3. Vinicius Licks, Fabrício Ourique, Ramiro Jordan, Fernando Pérez-González
    The effect of the random jitter attack on the bit error rate performance of spatial domain image watermarking. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2003, pp:455-458 [Conf]
  4. Fernando Pérez-González, Félix Balado
    Quantized projection data hiding. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2002, pp:889-892 [Conf]
  5. Fernando Pérez-González, Pedro Comesaña, Félix Balado
    Dither-modulation data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2003, pp:503-506 [Conf]
  6. Juan Ramón Hernández, Fernando Pérez-González
    Shedding More Light on Image Watermarks. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1998, pp:191-207 [Conf]
  7. Pedro Comesaña, Luis Pérez-Freire, Fernando Pérez-González
    Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:146-160 [Conf]
  8. Luis Pérez-Freire, Pedro Comesaña, Fernando Pérez-González
    Information-Theoretic Analysis of Security in Side-Informed Data Hiding. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:131-145 [Conf]
  9. Fernando Pérez-González, Félix Balado
    Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:87-105 [Conf]
  10. Andrea Abrardo, Mauro Barni, Fernando Pérez-González, Carlos Mosquera
    Trellis-Coded Rational Dither Modulation for Digital Watermarking. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:351-360 [Conf]
  11. Pedro Comesaña, Fernando Pérez-González, Félix Balado
    Optimal Data-Hiding Strategies for Games with BER Payoffs. [Citation Graph (0, 0)][DBLP]
    IWDW, 2003, pp:101-116 [Conf]
  12. Pedro Comesaña, Luis Pérez-Freire, Fernando Pérez-González
    The Return of the Sensitivity Attack. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:260-274 [Conf]
  13. Fernando Pérez-González
    The Importance of Aliasing in Structured Quantization Index Modulation Data Hiding. [Citation Graph (0, 0)][DBLP]
    IWDW, 2003, pp:1-17 [Conf]
  14. José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fernando Pérez-González, Thierry Pun
    Practical Data-Hiding: Additive Attacks Performance Analysis. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:244-259 [Conf]
  15. Alberto Malvido, Fernando Pérez-González, Armando Cousiño
    A Novel Model for the Print-and-Capture Channel in 2D Bar Codes. [Citation Graph (0, 0)][DBLP]
    MRCS, 2006, pp:627-634 [Conf]
  16. Juan Ramón Hernández, Martin Amado, Fernando Pérez-González
    Novel techniques for watermark extraction in the DCT domain. [Citation Graph (0, 0)][DBLP]
    NSIP, 1999, pp:331-335 [Conf]
  17. Félix Balado, Fernando Pérez-González, Pedro Comesaña
    Blind iterative decoding of side-informed data hiding using the expectation-maximization algorithm. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:805-815 [Conf]
  18. Pedro Comesaña, Fernando Pérez-González
    Quantifying security leaks in spread spectrum data hiding: a game-theoretic approach. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:592-601 [Conf]
  19. Pedro Comesaña, Fernando Pérez-González, Frans M. Willems
    Applying Erez and Ten Brink's dirty paper codes to data hiding. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:298-307 [Conf]
  20. Luis Pérez-Freire, Pedro Comesaña Alfaro, Fernando Pérez-González
    Detection in quantization-based watermarking: performance and security issues. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:721-733 [Conf]
  21. Luis Pérez-Freire, Fernando Pérez-González
    Spread-spectrum vs. quantization-based data hiding: misconceptions and implications. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:341-352 [Conf]
  22. Fernando Pérez-González, Carlos Mosquera, Mauro Barni, Andrea Abrardo
    Ensuring gain-invariance in high-rate data hiding. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:206-217 [Conf]
  23. Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Frédéric Deguillaume, Fernando Pérez-González, Thierry Pun
    Robustness improvement of known-host-state watermarking using host statistics. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:569-577 [Conf]
  24. José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fernando Pérez-González, Thierry Pun
    Worst-case additive attack against quantization-based data-hiding methods. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:136-146 [Conf]
  25. Luis Pérez-Freire, Pedro Comesaña, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González
    Watermarking Security: A Survey. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:41-72 [Journal]
  26. Juan Ramón Hernández, Martin Amado, Fernando Pérez-González
    DCT-domain watermarking techniques for still images: detector performance analysis and a new structure. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2000, v:9, n:1, pp:55-68 [Journal]
  27. Fernando Pérez-González
    Special section on "Signal Processing Techniques for Emerging Communications Applications". [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2001, v:81, n:8, pp:- [Journal]
  28. Nuria González Prelcic, Fernando Pérez-González, M. Elena Domínguez Jiménez
    Wavelet packet-based subband adaptive equalization. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2001, v:81, n:8, pp:1641-1662 [Journal]
  29. Fernando Pérez-González, Juan Ramón Hernández, Félix Balado
    Approaching the capacity limit in image watermarking: a perspective on coding techniques for data hiding applications. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2001, v:81, n:6, pp:1215-1238 [Journal]
  30. Oleksiy J. Koval, Sviatoslav Voloshynovskiy, José-Emilio Vila-Forcén, Fernando Pérez-González, Frédéric Deguillaume, Thierry Pun
    Robustness improvement of known-host-state data-hiding using host statistics. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2006, v:86, n:5, pp:1076-1088 [Journal]
  31. Sviatoslav Voloshynovskiy, Thierry Pun, Jessica J. Fridrich, Fernando Pérez-González, N. Memon
    Security of data hiding technologies. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2003, v:83, n:10, pp:2065-2067 [Journal]
  32. Carlos Mosquera, Fernando Pérez-González
    Convergence analysis of the multiple-channel filtered-U recursive LMS algorithm for active noise control. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2000, v:80, n:5, pp:849-856 [Journal]
  33. Juan Ramón Hernández, J. M. Rodríguez, Fernando Pérez-González
    Improving the performance of spatial watermarking of images using channel coding. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2000, v:80, n:7, pp:1261-1279 [Journal]
  34. Luis Pérez-Freire, Fernando Pérez-González, Teddy Furon
    On achievable security levels for lattice data hiding in the known message attack scenario. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:68-79 [Conf]
  35. Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González
    Zero-knowledge watermark detector robust to sensitivity attacks. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:97-107 [Conf]
  36. Pedro Comesaña, Fernando Pérez-González
    On the capacity of stegosystems. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:15-24 [Conf]
  37. Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Fernando Pérez-González, Frédéric Deguillaume, Thierry Pun
    Quantization-based watermarking performance improvement using host statistics: AWGN attack case. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:35-39 [Conf]

  38. Videosurveillance and privacy: covering the two sides of the mirror with DRM. [Citation Graph (, )][DBLP]


  39. Benford's Lawin Image Processing. [Citation Graph (, )][DBLP]


  40. On a Watermarking Scheme in the Logarithmic Domain and its Perceptual Advantages. [Citation Graph (, )][DBLP]


  41. Modeling Gabor Coefficients via Generalized Gaussian Distributions for Face Recognition. [Citation Graph (, )][DBLP]


  42. Statistical Analysis of a Linear Algebra Asymmetricwatermarking Scheme. [Citation Graph (, )][DBLP]


  43. Modeling magnitudes of Gabor coefficients: The beta-Rayleigh distribution. [Citation Graph (, )][DBLP]


  44. Skewed log-stable model for natural images pixel block-variance. [Citation Graph (, )][DBLP]


  45. Perfomance analysis of the Fridrich-Goljan self-embedding authentication method. [Citation Graph (, )][DBLP]


  46. Exploiting Security Holes in Lattice Data Hiding. [Citation Graph (, )][DBLP]


  47. Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding. [Citation Graph (, )][DBLP]


  48. Dither Modulation in the Logarithmic Domain. [Citation Graph (, )][DBLP]


  49. Model-based steganalysis using invariant features. [Citation Graph (, )][DBLP]


Search in 0.047secs, Finished in 0.051secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002