Pedro Comesaña Alfaro

Affiliations:
  • University of Vigo, atlanTTic Research Center, Spain


According to our database1, Pedro Comesaña Alfaro authored at least 65 papers between 2003 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
A Critical Look into Quantization Table Generalization Capabilities of CNN-based Double JPEG Compression Detection.
Proceedings of the 30th European Signal Processing Conference, 2022

2017
A Random Matrix Approach to the Forensic Analysis of Upscaled Images.
IEEE Trans. Inf. Forensics Secur., 2017

Smart Detection of Line-Search Oracle Attacks.
IEEE Trans. Inf. Forensics Secur., 2017

Derivation of the Asymptotic Eigenvalue Distribution for Causal 2D-AR Models under Upscaling.
CoRR, 2017

Random Matrix Theory for Modeling the Eigenvalue Distribution of Images Under Upscaling.
Proceedings of the Digital Communication. Towards a Smart and Secure Future Internet, 2017

2016
Introduction of New Associate Editors.
IEEE Trans. Circuits Syst. Video Technol., 2016

Report on Dirty Paper Coding Estimation with multidimensional lattices.
CoRR, 2016

Effect of Compression on Sensor-Fingerprint Based Camera Identification.
Proceedings of the Media Watermarking, 2016

Improving Selection-Channel-Aware Steganalysis Features.
Proceedings of the Media Watermarking, 2016

Fast sequential forensic detection of camera fingerprint.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

V-DIFT: Vector-Based Dynamic Information Flow Tracking with Application to Locating Cryptographic Keys for Reverse Engineering.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images.
IEEE Trans. Inf. Forensics Secur., 2015

Fast sequential forensic camera identification.
CoRR, 2015

On the effectiveness of meta-detection for countering oracle attacks in watermarking.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

An SVD approach to forensic image resampling detection.
Proceedings of the 23rd European Signal Processing Conference, 2015

2014
The optimal attack to histogram-based forensic detectors is simple(x).
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

Are you threatening me?: Towards smart detectors in watermarking.
Proceedings of the Media Watermarking, 2014

A new look at ML step-size estimation for Scalar Costa scheme data hiding.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Transportation-theoretic image counterforensics to First Significant Digit histogram forensics.
Proceedings of the IEEE International Conference on Acoustics, 2014

Flat fading channel estimation based on Dirty Paper Coding.
Proceedings of the IEEE International Conference on Acoustics, 2014

2013
Set-membership identification of resampled signals.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

Joint detection of full-frame linear filtering and JPEG compression in digital images.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

Taking advantage of source correlation in forensic analysis.
Proceedings of the 15th IEEE International Workshop on Multimedia Signal Processing, 2013

Forensic analysis of full-frame linearly filtered JPEG images.
Proceedings of the IEEE International Conference on Image Processing, 2013

Quantization lattice estimation for multimedia forensics.
Proceedings of the IEEE International Conference on Image Processing, 2013

Optimal counterforensics for histogram-based forensics.
Proceedings of the IEEE International Conference on Acoustics, 2013

2012
Detection of video double encoding with GOP size estimation.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

ML estimation of the resampling factor.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

IPTV streaming source classification.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Multimedia Operator Chain Topology and Ordering Estimation Based on Detection and Information Theoretic Tools.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

2011
Witsenhausen's Counterexample and Its Links with Multimedia Security Problems.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

Weber's law-based side-informed data hiding.
Proceedings of the IEEE International Conference on Acoustics, 2011

A new method for perspective correction of document images.
Proceedings of the Document Recognition and Retrieval XVIII, 2011

2010
Asymptotically optimum universal watermark embedding and detection in the high-SNR regime.
IEEE Trans. Inf. Theory, 2010

2009
Performance analysis of Fridrich-Goljan self-embedding authentication method.
IEEE Trans. Inf. Forensics Secur., 2009

Perfomance analysis of the Fridrich-Goljan self-embedding authentication method.
Proceedings of the International Conference on Image Processing, 2009

Videosurveillance and privacy: covering the two sides of the mirror with DRM.
Proceedings of the 9th ACM Workshop on Digital Rights Management, 2009

2008
Asymptotically Optimum Universal One-Bit Watermarking for Gaussian Covertexts and Gaussian Attacks
CoRR, 2008

Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks.
Proceedings of the Security, 2008

2007
Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks.
EURASIP J. Inf. Secur., 2007

Two different approaches for attacking BOWS.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

A novel interpretation of content authentication.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

On the capacity of stegosystems.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Dither Modulation in the Logarithmic Domain.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Modeling Gabor Coefficients via Generalized Gaussian Distributions for Face Recognition.
Proceedings of the International Conference on Image Processing, 2007

On a Watermarking Scheme in the Logarithmic Domain and its Perceptual Advantages.
Proceedings of the International Conference on Image Processing, 2007

Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking.
Proceedings of the IEEE International Conference on Acoustics, 2007

2006
On distortion-compensated dither modulation data-hiding with repetition coding.
IEEE Trans. Signal Process., 2006

Security of Lattice-Based Data Hiding Against the Known Message Attack.
IEEE Trans. Inf. Forensics Secur., 2006

Watermarking Security: A Survey.
Trans. Data Hiding Multim. Secur., 2006

The impact of the cropping attack on scalar STDM data hiding.
IEEE Signal Process. Lett., 2006

Secret dither estimation in lattice-quantization data hiding: a set membership approach.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

The blind Newton sensitivity attack.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

2005
Detection in quantization-based watermarking: performance and security issues.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Applying Erez and Ten Brink's dirty paper codes to data hiding.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

The Return of the Sensitivity Attack.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

Information-Theoretic Analysis of Security in Side-Informed Data Hiding.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis.
Proceedings of the Information Hiding, 7th International Workshop, 2005

On Reversibility of Random Binning Techniques: Multimedia Perspectives.
Proceedings of the Communications and Multimedia Security, 2005

2004
Quantifying security leaks in spread spectrum data hiding: a game-theoretic approach.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Blind iterative decoding of side-informed data hiding using the expectation-maximization algorithm.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

2003
Optimal Data-Hiding Strategies for Games with BER Payoffs.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

Dither-modulation data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks.
Proceedings of the 2003 International Conference on Image Processing, 2003

Optimal strategies for spread-spectrum and quantized-projection image data hiding games with BER payoffs.
Proceedings of the 2003 International Conference on Image Processing, 2003


  Loading...