Luis Pérez-Freire

According to our database1, Luis Pérez-Freire authored at least 26 papers between 2004 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
The maven project: Management and Authenticity Verification of multimedia contents.
Proceedings of the 2015 IEEE International Conference on Multimedia & Expo Workshops, 2015

2013
Gradiant asymmetric encryption and verification systems based on handwritten signature.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2011
Built-in face recognition for smart photo sharing in mobile devices.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

2009
Spread-spectrum watermarking security.
IEEE Trans. Inf. Forensics Secur., 2009

Blind decoder for binary probabilistic traitor tracing codes.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Worst case attacks against binary probabilistic traitor tracing codes.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

EM decoding of tardos traitor tracing codes.
Proceedings of the Multimedia and Security Workshop, 2009

Estimating the Minimal Length of Tardos Code.
Proceedings of the Information Hiding, 11th International Workshop, 2009

Videosurveillance and privacy: covering the two sides of the mirror with DRM.
Proceedings of the 9th ACM Workshop on Digital Rights Management, 2009

2008
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack.
IEEE Trans. Inf. Forensics Secur., 2008

2007
Security of spread-spectrum-based data hiding.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Exploiting Security Holes in Lattice Data Hiding.
Proceedings of the Information Hiding, 9th International Workshop, 2007

Modeling Gabor Coefficients via Generalized Gaussian Distributions for Face Recognition.
Proceedings of the International Conference on Image Processing, 2007

2006
An accurate analysis of scalar quantization-based data hiding.
IEEE Trans. Inf. Forensics Secur., 2006

Security of Lattice-Based Data Hiding Against the Known Message Attack.
IEEE Trans. Inf. Forensics Secur., 2006

Watermarking Security: A Survey.
Trans. Data Hiding Multim. Secur., 2006

Secret dither estimation in lattice-quantization data hiding: a set membership approach.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

The blind Newton sensitivity attack.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

On achievable security levels for lattice data hiding in the known message attack scenario.
Proceedings of the 8th workshop on Multimedia & Security, 2006

2005
Spread-spectrum vs. quantization-based data hiding: misconceptions and implications.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Detection in quantization-based watermarking: performance and security issues.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

The Return of the Sensitivity Attack.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

Information-Theoretic Analysis of Security in Side-Informed Data Hiding.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis.
Proceedings of the Information Hiding, 7th International Workshop, 2005

2004
Revealing the true achievable rates of scalar Costa scheme.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004

A multimedia approach for audio segmentation in TV broadcast news.
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004


  Loading...