Félix Balado

Orcid: 0000-0001-9294-3038

According to our database1, Félix Balado authored at least 54 papers between 1999 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Online Gesture Recognition using Transformer and Natural Language Processing.
CoRR, 2023

Online Handwriting Gesture Recognition Using Transformer and Natural Language Processing.
Proceedings of the 31st European Signal Processing Conference, 2023

2021
Benford's Law: Hammering A Square Peg Into A Round Hole?
Proceedings of the 29th European Signal Processing Conference, 2021

2018
Asymptotically Optimum Perfect Universal Steganography of Finite Memoryless Sources.
IEEE Trans. Inf. Theory, 2018

Towards Optimum Counterforensics of Multiple Significant Digits Using Majorisation-Minimisation.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Optimum Exact Histogram Specification.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

2015
Optimum reversible data hiding and permutation coding.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

2014
Optimum Perfect Universal Steganography of Finite Memoryless Sources.
CoRR, 2014

The role of permutation coding in minimum-distortion perfect counterforensics.
Proceedings of the IEEE International Conference on Acoustics, 2014

2013
Capacity of DNA Data Embedding Under Substitution Mutations.
IEEE Trans. Inf. Theory, 2013

BioCode: Two biologically compatible Algorithms for embedding data in non-coding and coding regions of DNA.
BMC Bioinform., 2013

Optimum perfect steganography of memoryless sources as a rate-distortion problem.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

A modified watermark synchronisation code for robust embedding of data in DNA.
Proceedings of the IEEE International Conference on Acoustics, 2013

Permutation codes and steganography.
Proceedings of the IEEE International Conference on Acoustics, 2013

Security study of keyed DNA data embedding.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

2011
Genetic Channel Capacity Revisited.
Proceedings of the Bio-Inspired Models of Networks, Information, and Computing Systems, 2011

Repetition Coding as an Effective Error Correction Code for Information Encoded in DNA.
Proceedings of the 11th IEEE International Conference on Bioinformatics and Bioengineering, 2011

2010
An Introduction to the Principles and Requirements of Robust Hashing.
Proceedings of the Intelligent Multimedia Analysis for Security Applications, 2010

On the embedding capacity of DNA strands under substitution, insertion, and deletion mutations.
Proceedings of the Media Forensics and Security II, 2010

On the Shannon capacity of DNA data embedding.
Proceedings of the IEEE International Conference on Acoustics, 2010

Performance of DNA data embedding algorithms under substitution mutations.
Proceedings of the 2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2010

2008
Markov Modelling of Fingerprinting Systems for Collision Analysis.
EURASIP J. Inf. Secur., 2008

2007
Performance Analysis of Robust Audio Hashing.
IEEE Trans. Inf. Forensics Secur., 2007

A Two-Dimensional Extension of the Mueller and Müller Timing Error Detector.
IEEE Signal Process. Lett., 2007

A novel interpretation of content authentication.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

On distortion measures associated to random desynchronization attacks.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Performance of Philips Audio Fingerprinting under Desynchronisation.
Proceedings of the 8th International Conference on Music Information Retrieval, 2007

Performance of Philips Audio Fingerprinting Under Additive Noise.
Proceedings of the IEEE International Conference on Acoustics, 2007

2006
On distortion-compensated dither modulation data-hiding with repetition coding.
IEEE Trans. Signal Process., 2006

New results on robustness of secure steganography.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Sphere-hardening dither modulation.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

PLL-Based Synchronization of Dither-Modulation Data Hiding.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

2005
Joint iterative decoding and estimation for side-informed data hiding.
IEEE Trans. Signal Process., 2005

Iterative estimation of amplitude scaling on distortion-compensated dither modulation.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

A model for improving the performance of feature-extraction-based robust hashing.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

ML detection of steganography.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

On the Achievable Rate of Side Informed Embedding Techniques with Steganographic Constraints.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

New Geometric Analysis of Spread-Spectrum Data Hiding with Repetition Coding, with Implications for Side-Informed Schemes.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

Dither Modulation Watermarking of Dynamic Memory Traces.
Proceedings of the Information Hiding, 7th International Workshop, 2005

2004
Blind iterative decoding of side-informed data hiding using the expectation-maximization algorithm.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

A framework for soft hashing and its application to robust image hashing.
Proceedings of the 2004 International Conference on Image Processing, 2004

2003
Performance analysis of existing and new methods for data hiding with known-host information in additive channels.
IEEE Trans. Signal Process., 2003

Hexagonal quantizers are not optimal for 2D data hiding.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

Optimal Data-Hiding Strategies for Games with BER Payoffs.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

Dither-modulation data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks.
Proceedings of the 2003 International Conference on Image Processing, 2003

Optimal strategies for spread-spectrum and quantized-projection image data hiding games with BER payoffs.
Proceedings of the 2003 International Conference on Image Processing, 2003

2002
Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation.
Proceedings of the Information Hiding, 5th International Workshop, 2002

Improving data hiding performance by using quantization in a projected domain.
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002

Provably or probably robust data hiding?
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002

Quantized projection data hiding.
Proceedings of the 2002 International Conference on Image Processing, 2002

2001
Approaching the capacity limit in image watermarking: a perspective on coding techniques for data hiding applications.
Signal Process., 2001

Coding at the sample level for data hiding: turbo and concatenated codes.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

2000
<i>ArboX</i>: A contribution to digital library.
Comput. Appl. Eng. Educ., 2000

1999
A Two-Stage Code-book Building Method Using Fast WAN.
Proceedings of the 1oth International Conference on Image Analysis and Processing (ICIAP 1999), 1999


  Loading...