The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Pedro Comesaña: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Pedro Comesaña, Fernando Pérez-González, Félix Balado
    Optimal strategies for spread-spectrum and quantized-projection image data hiding games with BER payoffs. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2003, pp:479-482 [Conf]
  2. Fernando Pérez-González, Pedro Comesaña, Félix Balado
    Dither-modulation data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2003, pp:503-506 [Conf]
  3. Pedro Comesaña, Luis Pérez-Freire, Fernando Pérez-González
    Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:146-160 [Conf]
  4. Luis Pérez-Freire, Pedro Comesaña, Fernando Pérez-González
    Information-Theoretic Analysis of Security in Side-Informed Data Hiding. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:131-145 [Conf]
  5. Pedro Comesaña, Fernando Pérez-González, Félix Balado
    Optimal Data-Hiding Strategies for Games with BER Payoffs. [Citation Graph (0, 0)][DBLP]
    IWDW, 2003, pp:101-116 [Conf]
  6. Pedro Comesaña, Luis Pérez-Freire, Fernando Pérez-González
    The Return of the Sensitivity Attack. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:260-274 [Conf]
  7. Félix Balado, Fernando Pérez-González, Pedro Comesaña
    Blind iterative decoding of side-informed data hiding using the expectation-maximization algorithm. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:805-815 [Conf]
  8. Pedro Comesaña, Fernando Pérez-González
    Quantifying security leaks in spread spectrum data hiding: a game-theoretic approach. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:592-601 [Conf]
  9. Pedro Comesaña, Fernando Pérez-González, Frans M. Willems
    Applying Erez and Ten Brink's dirty paper codes to data hiding. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:298-307 [Conf]
  10. Luis Pérez-Freire, Pedro Comesaña, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González
    Watermarking Security: A Survey. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:41-72 [Journal]
  11. Pedro Comesaña, Fernando Pérez-González
    On the capacity of stegosystems. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:15-24 [Conf]

  12. Videosurveillance and privacy: covering the two sides of the mirror with DRM. [Citation Graph (, )][DBLP]


  13. On a Watermarking Scheme in the Logarithmic Domain and its Perceptual Advantages. [Citation Graph (, )][DBLP]


  14. Dither Modulation in the Logarithmic Domain. [Citation Graph (, )][DBLP]


  15. Asymptotically Optimum Universal One-Bit Watermarking for Gaussian Covertexts and Gaussian Attacks [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002