Julio Hernandez-Castro

According to our database1, Julio Hernandez-Castro authored at least 22 papers between 2015 and 2018.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG.
IEEE Trans. Information Forensics and Security, 2018

Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns.
Sensors, 2018

Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts.
Sensors, 2018

Dismantling OpenPuff PDF steganography.
Digital Investigation, 2018

Great Expectations: A Critique of Current Approaches to Random Number Generation Testing & Certification.
Proceedings of the Security Standardisation Research - 4th International Conference, 2018

Security Analysis of Contiki IoT Operating System.
Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks, 2018

No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation.
IEEE Trans. Information Forensics and Security, 2017

Quam Bene Non Quantum: Bias in a Family of Quantum Random Number Generators.
IACR Cryptology ePrint Archive, 2017

A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques.
Future Generation Comp. Syst., 2017

An Analysis of Bitcoin Laundry Services.
Proceedings of the Secure IT Systems, 2017

GenFace: Improving Cyber Security Using Realistic Synthetic Face Generation.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

Pitfalls in Ultralightweight Authentication Protocol Designs.
IEEE Trans. Mob. Comput., 2016

No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples with Applications to CAPTCHA.
IACR Cryptology ePrint Archive, 2016

A Survey of Security and Privacy Issues in ePassport Protocols.
ACM Comput. Surv., 2016

Theia: a tool for the forensic analysis of mobile devices pictures.
Computing, 2016

Bias in the Mifare DESFire EV1 TRNG.
Proceedings of the Radio Frequency Identification and IoT Security, 2016

Forensic analysis of video steganography tools.
PeerJ PrePrints, 2015

Forensic analysis of video steganography tools.
PeerJ Computer Science, 2015

Automatic detection of potentially illegal online sales of elephant ivory via data mining.
PeerJ Computer Science, 2015

Smartphone image acquisition forensics using sensor fingerprint.
IET Computer Vision, 2015

Steganalysis of OpenPuff through atomic concatenation of MP4 flags.
Digital Investigation, 2015

On the limits of engine analysis for cheating detection in chess.
Computers & Security, 2015