Tomás Filler

According to our database1, Tomás Filler authored at least 20 papers between 2007 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Watermarking spot colors in packaging.
Proceedings of the Media Watermarking, 2015

2014
Feature-based watermark localization in digital capture systems.
Proceedings of the Media Watermarking, 2014

2013
Moving steganography and steganalysis from the laboratory into the real world.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

2011
Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.
IEEE Trans. Inf. Forensics Secur., 2011

Design of adaptive steganographic schemes for digital images.
Proceedings of the Media Forensics and Security III, 2011

"Break Our Steganographic System": The Ins and Outs of Organizing BOSS.
Proceedings of the Information Hiding - 13th International Conference, 2011

2010
Gibbs Construction in Steganography.
IEEE Trans. Inf. Forensics Secur., 2010

Minimizing additive distortion functions with non-binary embedding operation in steganography.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Steganography using Gibbs random fields.
Proceedings of the Multimedia and Security Workshop, 2010

Managing a large database of camera fingerprints.
Proceedings of the Media Forensics and Security II, 2010

Minimizing embedding impact in steganography using trellis-coded quantization.
Proceedings of the Media Forensics and Security II, 2010

Using High-Dimensional Image Models to Perform Highly Undetectable Steganography.
Proceedings of the Information Hiding - 12th International Conference, 2010

2009
Wet ZZW construction for steganography.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Large scale test of sensor fingerprint camera identification.
Proceedings of the Media Forensics and Security I, 2009

The square root law of steganographic capacity for Markov covers.
Proceedings of the Media Forensics and Security I, 2009

Fisher Information Determines Capacity of ε-Secure Steganography.
Proceedings of the Information Hiding, 11th International Workshop, 2009

Complete characterization of perfectly secure stego-systems with mutually independent embedding operation.
Proceedings of the IEEE International Conference on Acoustics, 2009

2008
Using sensor pattern noise for camera model identification.
Proceedings of the International Conference on Image Processing, 2008

2007
Binary quantization using Belief Propagation with decimation over factor graphs of LDGM codes
CoRR, 2007

Practical methods for minimizing embedding impact in steganography.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007


  Loading...