José-Emilio Vila-Forcén

According to our database1, José-Emilio Vila-Forcén authored at least 18 papers between 2004 and 2008.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2008
Quantization-Based Methods: Additive Attacks Performance Analysis.
Trans. Data Hiding Multim. Secur., 2008

Compressive sensing detection of stochastic signals.
Proceedings of the 42nd Annual Conference on Information Sciences and Systems, 2008

2006
Robustness improvement of known-host-state data-hiding using host statistics.
Signal Process., 2006

Facial Image Compression Based on Structured Codebooks in Overcomplete Domain.
EURASIP J. Adv. Signal Process., 2006

Information-theoretic analysis of electronic and printed document authentication.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Text data-hiding for digital and printed documents: theoretical and practical considerations.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Asymmetrically informed data-hiding optimization of achievable rate for Laplacian host.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Performance analysis of nonuniform quantization-based data hiding.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

E-capacity analysis of data-hiding channels with geometrical attacks.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

On reversibility of random binning based data-hiding techniques: security perspectives.
Proceedings of the 8th workshop on Multimedia & Security, 2006

Costa Problem Under Channel Ambiguity.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

2005
Worst-case additive attack against quantization-based data-hiding methods.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Practical Data-Hiding: Additive Attacks Performance Analysis.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

Asymmetric spread spectrum data-hiding for Laplacian host data.
Proceedings of the 2005 International Conference on Image Processing, 2005

Data-hiding with partially available side information.
Proceedings of the 13th European Signal Processing Conference, 2005

On Reversibility of Random Binning Techniques: Multimedia Perspectives.
Proceedings of the Communications and Multimedia Security, 2005

2004
Distributed single source coding with side information.
Proceedings of the Visual Communications and Image Processing 2004, 2004

Worst case additive attack against quantization-based watermarking techniques.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004


  Loading...