David Megías

Orcid: 0000-0002-0507-7731

Affiliations:
  • Open University of Catalonia (UOC), Internet Interdisciplinary Institute, Barcelona, Spain


According to our database1, David Megías authored at least 86 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Fair and Private Data Preprocessing through Microaggregation.
ACM Trans. Knowl. Discov. Data, April, 2024

Aletheia: an open-source toolbox for steganalysis.
J. Open Source Softw., February, 2024

Analysis and effectiveness of deeper levels of SVD on performance of hybrid DWT and SVD watermarking.
Multim. Tools Appl., January, 2024

Digital Watermarking - A Meta-Survey and Techniques for Fake News Detection.
IEEE Access, 2024

2023
Subsequent Embedding in Targeted Image Steganalysis: Theoretical Framework and Practical Applications.
IEEE Trans. Dependable Secur. Comput., 2023

Deep Learning for Diverse Data Types Steganalysis: A Review.
CoRR, 2023

ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks.
CoRR, 2023

Differentially Private Graph Publishing Through Noise-Graph Addition.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2023

Evaluation and Analysis of Reversible Watermarking Techniques in WSN for Secure, Lightweight Design of IoT Applications: A Survey.
Proceedings of the Advances in Information and Communication, 2023

Real-world actor-based image steganalysis via classifier inconsistency detection.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Architecture of a fake news detection system combining digital watermarking, signal processing, and machine learning.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022

High capacity speech steganography for the G723.1 coder based on quantised line spectral pairs interpolation and CNN auto-encoding.
Appl. Intell., 2022

Towards Measuring Fairness for Local Differential Privacy.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022

2021
Give more data, awareness and control to individual citizens, and they will help COVID-19 containment.
Ethics Inf. Technol., 2021

Collaborative and efficient privacy-preserving critical incident management system.
Expert Syst. Appl., 2021

Subsequent embedding in image steganalysis: Theoretical framework and practical applications.
CoRR, 2021

Are Sequential Patterns Shareable? Ensuring Individuals' Privacy.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2021

Retransmission steganography in real-world scenarios: a practical study.
Proceedings of the EICC '21: European Interdisciplinary Cybersecurity Conference, 2021

Detecting Deepfake Videos using Digital Watermarking.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2021

DISSIMILAR: Towards fake news detection using information hiding, signal processing and machine learning.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Swapping trajectories with a sufficient sanitizer.
Pattern Recognit. Lett., 2020

Secure protocol to protect location privacy in distance calculation.
CoRR, 2020

Survey on Decentralized Fingerprinting Solutions: Copyright Protection through Piracy Tracing.
Comput., 2020

Data hiding: New opportunities for security and privacy?
Proceedings of the EICC 2020: European Interdisciplinary Cybersecurity Conference, 2020

Taxonomy and challenges in machine learning-based approaches to detect attacks in the internet of things.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Pitch and Fourier magnitude based steganography for hiding 2.4 kbps MELP bitstream.
IET Signal Process., 2019

Entropy-Based Semi-Fragile Watermarking of Remote Sensing Images in the Wavelet Domain.
Entropy, 2019

SeVEP: Secure and Verifiable Electronic Polling System.
IEEE Access, 2019

Detection of Classifier Inconsistencies in Image Steganalysis.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

Blockchain-based P2P multimedia content distribution using collusion-resistant fingerprinting.
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019

2018
Protecting Privacy in Trajectories with a User-Centric Approach.
ACM Trans. Knowl. Discov. Data, 2018

Adjustable audio watermarking algorithm based on DWPT and psychoacoustic modeling.
Multim. Tools Appl., 2018

SwapMob: Swapping Trajectories for Mobility Anonymization.
Proceedings of the Privacy in Statistical Databases, 2018

VSPReP: Verifiable, Secure and Privacy-Preserving Remote Polling with Untrusted Computing Devices.
Proceedings of the Future Network Systems and Security - 4th International Conference, 2018

2017
Individual Differential Privacy: A Utility-Preserving Formulation of Differential Privacy Guarantees.
IEEE Trans. Inf. Forensics Secur., 2017

Collusion-resistant and privacy-preserving P2P multimedia distribution based on recombined fingerprinting.
Expert Syst. Appl., 2017

2016
PSUM: Peer-to-peer multimedia content distribution using collusion-resistant fingerprinting.
J. Netw. Comput. Appl., 2016

Unsupervised steganalysis based on artificial training sets.
Eng. Appl. Artif. Intell., 2016

Enabling Collaborative Privacy in User-Generated Emergency Reports.
Proceedings of the Privacy in Statistical Databases, 2016

Co-utility for digital content protection and digital forgetting.
Proceedings of the 2016 Mediterranean Ad Hoc Networking Workshop, 2016

Flexible image watermarking in JPEG domain.
Proceedings of the 2016 IEEE International Symposium on Signal Processing and Information Technology, 2016

Enhanced Collusion Resistance for Segment-wise Recombined Fingerprinting in P2P Distribution Systems: [Extended Abstract].
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

State-of-the-art, challenges and open issues in integrating security and privacy in P2P content distribution systems.
Proceedings of the Eleventh International Conference on Digital Information Management, 2016

2015
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints.
IEEE Trans. Dependable Secur. Comput., 2015

Audio Watermarking Based on Fibonacci Numbers.
IEEE ACM Trans. Audio Speech Lang. Process., 2015

Framework for preserving security and privacy in peer-to-peer content distribution systems.
Expert Syst. Appl., 2015

Transparent high capacity audio watermarking in wavelet domain.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

User-Centric Privacy-Preserving Collection and Analysis of Trajectory Data.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

2014
Privacy-aware peer-to-peer content distribution using automatically recombined fingerprints.
Multim. Syst., 2014

Secure logarithmic audio watermarking scheme based on the human auditory system.
Multim. Syst., 2014

Robust Audio Watermarking Based on Fibonacci Numbers.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014

Fast and Low-Complexity Audio Watermarking.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014

2013
LSB matching steganalysis based on patterns of pixel differences and random embedding.
Comput. Secur., 2013

Distributed multicast of fingerprinted content based on a rational peer-to-peer community.
Comput. Commun., 2013

Improving reversible histogram based data hiding schemes with an image preprocessing method.
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013

DNA-inspired anonymous fingerprinting for efficient peer-to-peer content distribution.
Proceedings of the IEEE Congress on Evolutionary Computation, 2013

2012
Adaptive Speech Watermarking in Wavelet Domain based on Logarithm.
Proceedings of the SECRYPT 2012, 2012

High Capacity Logarithmic Audio Watermarking Based on the Human Auditory System.
Proceedings of the 2012 IEEE International Symposium on Multimedia, 2012

2011
Subjectively adapted high capacity lossless image data hiding based on prediction errors.
Multim. Tools Appl., 2011

High capacity audio watermarking using the high frequency band of the wavelet domain.
Multim. Tools Appl., 2011

Improved flooding of broadcast messages using extended multipoint relaying.
J. Netw. Comput. Appl., 2011

Lossless image data embedding in plain areas.
Proceedings of the Media Forensics and Security III, 2011

High Capacity FFT-Based Audio Watermarking.
Proceedings of the Communications and Multimedia Security, 2011

2010
Efficient self-synchronised blind audio watermarking system based on time domain and FFT amplitude modification.
Signal Process., 2010

Robust High-Capacity Audio Watermarking Based on FFT Amplitude Modification.
IEICE Trans. Inf. Syst., 2010

DWT-Based High Capacity Audio Watermarking.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

2009
High capacity audio watermarking using FFT amplitude interpolation.
IEICE Electron. Express, 2009

Free technology academy: a European initiative for distance education about free software and open standards.
Proceedings of the 14th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2009

High capacity, reversible data hiding in medical images.
Proceedings of the International Conference on Image Processing, 2009

2008
Reversible Data Hiding Based On H.264/AVC Intra Prediction.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

2006
Theoretical Framework for a Practical Evaluation and Comparison of Audio Watermarking Schemes in the Triangle of Robustness, Transparency and Capacity.
Trans. Data Hiding Multim. Secur., 2006

A benchmark assessment of the WAUC watermarking audio algorithm.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

2005
Robust watermarking scheme based on the JPEG2000 standard.
J. Electronic Imaging, 2005

Wavelet lossless compression of ultraspectral sounder data.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

Influence of mark embedding strategies on lossless compression of ultraspectral images.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

Total Disclosure of the Embedding and Detection Algorithms for a Secure Digital Watermarking Scheme for Audio.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

2004
An audio watermarking scheme robust against stereo attacks.
Proceedings of the 6th workshop on Multimedia & Security, 2004

Robust Frequency Domain Audio Watermarking: A Tuning Analysis.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

A Robust Frequency Domain Audio Watermarking Scheme for Monophonic and Stereophonic PCM Formats.
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004

2003
Empirical evaluation of a JPEG2000 standard-based robust watermarking scheme.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

A family of image watermarking schemes based on lossy compression.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression.
Proceedings of the Communications and Multimedia Security, 2003

2001
Min-max constrained infinite horizon model predictive control: Standard vs. feedback formulation.
Proceedings of the 6th European Control Conference, 2001

Model predictive control of greenhouse climatic processes using on-line linearisation.
Proceedings of the 6th European Control Conference, 2001

1999
A systematic method to enhance the robustness of stabilising receding-horizon predictive controllers.
Proceedings of the 5th European Control Conference, 1999

Extended linearised predictive control: Practical control algorithms for non-linear systems.
Proceedings of the 5th European Control Conference, 1999


  Loading...