default search action
Pedro Comesaña Alfaro
Person information
- affiliation: University of Vigo, atlanTTic Research Center, Spain
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [e4]Fernando Pérez-González, Pedro Comesaña Alfaro, Christian Krätzer, Hong Vicky Zhao:
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2024, Baiona, Spain, June 24-26, 2024. ACM 2024 [contents] - 2023
- [e3]Xianfeng Zhao, Zhenjun Tang, Pedro Comesaña Alfaro, Alessandro Piva:
Digital Forensics and Watermarking - 21st International Workshop, IWDW 2022, Guilin, China, November 18-19, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13825, Springer 2023, ISBN 978-3-031-25114-6 [contents] - 2022
- [c50]Elena Rodríguez Lois, David Vázquez-Padín, Fernando Pérez-González, Pedro Comesaña Alfaro:
A Critical Look into Quantization Table Generalization Capabilities of CNN-based Double JPEG Compression Detection. EUSIPCO 2022: 1022-1026 - [e2]Xianfeng Zhao, Alessandro Piva, Pedro Comesaña Alfaro:
Digital Forensics and Watermarking - 20th International Workshop, IWDW 2021, Beijing, China, November 20-22, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13180, Springer 2022, ISBN 978-3-030-95397-3 [contents]
2010 – 2019
- 2017
- [j11]Benedetta Tondi, Pedro Comesaña Alfaro, Fernando Pérez-González, Mauro Barni:
Smart Detection of Line-Search Oracle Attacks. IEEE Trans. Inf. Forensics Secur. 12(3): 588-603 (2017) - [j10]David Vazquez-Padin, Fernando Pérez-González, Pedro Comesaña Alfaro:
A Random Matrix Approach to the Forensic Analysis of Upscaled Images. IEEE Trans. Inf. Forensics Secur. 12(9): 2115-2130 (2017) - [c49]David Vázquez-Padín, Fernando Pérez-González, Pedro Comesaña Alfaro:
Random Matrix Theory for Modeling the Eigenvalue Distribution of Images Under Upscaling. TIWDC 2017: 109-124 - [i4]David Vazquez-Padin, Fernando Pérez-González, Pedro Comesaña Alfaro:
Derivation of the Asymptotic Eigenvalue Distribution for Causal 2D-AR Models under Upscaling. CoRR abs/1704.05773 (2017) - 2016
- [j9]Nikolaos V. Boulgouris, David R. Bull, Marco Cagnazzo, Andrea Cavallaro, Gene Cheung, Amit K. Roy-Chowdhury, Pedro Comesaña Alfaro, Shan Du, Sarp Ertürk, Markus Flierl, Gian Luca Foresti, Gang Hua, Zhu Li, Weisi Lin, Siwei Ma, Pramod Kumar Meher, Debargha Mukherjee, Aleksandra Pizurica, Andrea Prati, Paolo Remagnino, Arun Ross, Shin'ichi Satoh, Andreas E. Savakis, Heiko Schwarz, Ling Shao, Shervin Shirmohammadi, Giuseppe Valenzise, Meng Wang, Zhou Wang, Yonggang Wen, Dong Xu, Junsong Yuan, Yuan Yuan:
Introduction of New Associate Editors. IEEE Trans. Circuits Syst. Video Technol. 26(2): 253-263 (2016) - [c48]Antonio M. Espinoza, Jeffrey Knockel, Pedro Comesaña Alfaro, Jedidiah R. Crandall:
V-DIFT: Vector-Based Dynamic Information Flow Tracking with Application to Locating Cryptographic Keys for Reverse Engineering. ARES 2016: 266-271 - [c47]Fernando Pérez-González, Miguel Masciopinto, Iria González-Iglesias, Pedro Comesaña Alfaro:
Fast sequential forensic detection of camera fingerprint. ICIP 2016: 3902-3906 - [c46]Tomás Denemark, Jessica J. Fridrich, Pedro Comesaña Alfaro:
Improving Selection-Channel-Aware Steganalysis Features. Media Watermarking, Security, and Forensics 2016: 1-8 - [c45]Miroslav Goljan, Mo Chen, Pedro Comesaña, Jessica J. Fridrich:
Effect of Compression on Sensor-Fingerprint Based Camera Identification. Media Watermarking, Security, and Forensics 2016: 1-10 - [i3]Pedro Comesaña Alfaro, Fernando Pérez-González:
Report on Dirty Paper Coding Estimation with multidimensional lattices. CoRR abs/1603.06848 (2016) - 2015
- [j8]Valentina Conotter, Pedro Comesaña Alfaro, Fernando Pérez-González:
Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images. IEEE Trans. Inf. Forensics Secur. 10(11): 2257-2269 (2015) - [c44]David Vazquez-Padin, Pedro Comesaña Alfaro, Fernando Pérez-González:
An SVD approach to forensic image resampling detection. EUSIPCO 2015: 2067-2071 - [c43]Benedetta Tondi, Pedro Comesaña Alfaro, Fernando Pérez-González, Mauro Barni:
On the effectiveness of meta-detection for countering oracle attacks in watermarking. WIFS 2015: 1-6 - [e1]Adnan M. Alattar, Jessica J. Fridrich, Ned M. Smith, Pedro Comesaña Alfaro:
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2015, Portland, OR, USA, June 17 - 19, 2015. ACM 2015, ISBN 978-1-4503-3587-4 [contents] - [i2]Fernando Pérez-González, Iria González-Iglesias, Miguel Masciopinto, Pedro Comesaña:
Fast sequential forensic camera identification. CoRR abs/1510.03730 (2015) - 2014
- [c42]Cecilia Pasquini, Pedro Comesaña Alfaro, Fernando Pérez-González, Giulia Boato:
Transportation-theoretic image counterforensics to First Significant Digit histogram forensics. ICASSP 2014: 2699-2703 - [c41]Gabriel Domínguez-Conde, Pedro Comesaña Alfaro, Fernando Pérez-González:
Flat fading channel estimation based on Dirty Paper Coding. ICASSP 2014: 6479-6483 - [c40]Gabriel Domínguez-Conde, Pedro Comesaña Alfaro, Fernando Pérez-González:
A new look at ML step-size estimation for Scalar Costa scheme data hiding. ICIP 2014: 4211-4215 - [c39]Mauro Barni, Pedro Comesaña Alfaro, Fernando Pérez-González, Benedetta Tondi:
Are you threatening me?: Towards smart detectors in watermarking. Media Watermarking, Security, and Forensics 2014: 902806 - [c38]Pedro Comesaña, Fernando Pérez-González:
The optimal attack to histogram-based forensic detectors is simple(x). WIFS 2014: 137-142 - 2013
- [c37]Pedro Comesaña Alfaro, Fernando Pérez-González:
Optimal counterforensics for histogram-based forensics. ICASSP 2013: 3048-3052 - [c36]Pedro Comesaña, Fernando Pérez-González, Noelia Liste:
Quantization lattice estimation for multimedia forensics. ICIP 2013: 4452-4456 - [c35]Valentina Conotter, Pedro Comesaña, Fernando Pérez-González:
Forensic analysis of full-frame linearly filtered JPEG images. ICIP 2013: 4517-4521 - [c34]Pedro Comesaña, Fernando Pérez-González:
Taking advantage of source correlation in forensic analysis. MMSP 2013: 159-164 - [c33]David Vazquez-Padin, Pedro Comesaña, Fernando Pérez-González:
Set-membership identification of resampled signals. WIFS 2013: 150-155 - [c32]Valentina Conotter, Pedro Comesaña, Fernando Pérez-González:
Joint detection of full-frame linear filtering and JPEG compression in digital images. WIFS 2013: 156-161 - 2012
- [c31]Pedro Comesaña, Fernando Pérez-González:
Multimedia Operator Chain Topology and Ordering Estimation Based on Detection and Information Theoretic Tools. IWDW 2012: 213-227 - [c30]David Vazquez-Padin, Marco Fontani, Tiziano Bianchi, Pedro Comesaña, Alessandro Piva, Mauro Barni:
Detection of video double encoding with GOP size estimation. WIFS 2012: 151-156 - [c29]Miguel Masciopinto, Pedro Comesaña:
IPTV streaming source classification. WIFS 2012: 157-162 - [c28]David Vazquez-Padin, Pedro Comesaña:
ML estimation of the resampling factor. WIFS 2012: 205-210 - [c27]Pedro Comesaña:
Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains. WIFS 2012: 211-216 - 2011
- [c26]José Rodríguez-Piñeiro, Pedro Comesaña Alfaro, Fernando Pérez-González, Alberto Malvido-García:
A new method for perspective correction of document images. DRR 2011: 787410 - [c25]Pedro Comesaña, Fernando Pérez-González:
Weber's law-based side-informed data hiding. ICASSP 2011: 1840-1843 - [c24]Pedro Comesaña, Fernando Pérez-González, Chaouki T. Abdallah:
Witsenhausen's Counterexample and Its Links with Multimedia Security Problems. IWDW 2011: 479-493 - 2010
- [j7]Pedro Comesaña, Neri Merhav, Mauro Barni:
Asymptotically optimum universal watermark embedding and detection in the high-SNR regime. IEEE Trans. Inf. Theory 56(6): 2804-2815 (2010)
2000 – 2009
- 2009
- [j6]Gabriel Domínguez-Conde, Pedro Comesaña, Fernando Pérez-González:
Performance analysis of Fridrich-Goljan self-embedding authentication method. IEEE Trans. Inf. Forensics Secur. 4(3): 570-577 (2009) - [c23]Juan Ramón Troncoso-Pastoriza, Pedro Comesaña, Luis Pérez-Freire, Fernando Pérez-González:
Videosurveillance and privacy: covering the two sides of the mirror with DRM. Digital Rights Management Workshop 2009: 83-94 - [c22]Gabriel Domínguez-Conde, Pedro Comesaña Alfaro, Fernando Pérez-González:
Perfomance analysis of the Fridrich-Goljan self-embedding authentication method. ICIP 2009: 1253-1256 - 2008
- [c21]Pedro Comesaña, Neri Merhav, Mauro Barni:
Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 681909 - [i1]Pedro Comesaña, Neri Merhav, Mauro Barni:
Asymptotically Optimum Universal One-Bit Watermarking for Gaussian Covertexts and Gaussian Attacks. CoRR abs/0803.3880 (2008) - 2007
- [j5]Pedro Comesaña, Fernando Pérez-González:
Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks. EURASIP J. Inf. Secur. 2007 (2007) - [c20]Mauro Barni, Fernando Pérez-González, Pedro Comesaña, Guido Bartoli:
Putting Reproducible Signal Processing into Practice: A Case Study in Watermarking. ICASSP (4) 2007: 1261-1264 - [c19]Pedro Comesaña, Fernando Pérez-González:
On a Watermarking Scheme in the Logarithmic Domain and its Perceptual Advantages. ICIP (2) 2007: 145-148 - [c18]Daniel González-Jiménez, Fernando Pérez-González, Pedro Comesaña Alfaro, Luis Pérez-Freire, José Luis Alba-Castro:
Modeling Gabor Coefficients via Generalized Gaussian Distributions for Face Recognition. ICIP (4) 2007: 485-488 - [c17]Pedro Comesaña, Fernando Pérez-González:
Dither Modulation in the Logarithmic Domain. IWDW 2007: 308-322 - [c16]Pedro Comesaña, Fernando Pérez-González:
On the capacity of stegosystems. MM&Sec 2007: 15-24 - [c15]Pedro Comesaña, Félix Balado, Fernando Pérez-González:
A novel interpretation of content authentication. Security, Steganography, and Watermarking of Multimedia Contents 2007: 65050I - [c14]Pedro Comesaña, Fernando Pérez-González:
Two different approaches for attacking BOWS. Security, Steganography, and Watermarking of Multimedia Contents 2007: 65051B - 2006
- [j4]Pedro Comesaña, Fernando Pérez-González:
The impact of the cropping attack on scalar STDM data hiding. IEEE Signal Process. Lett. 13(6): 353-356 (2006) - [j3]Luis Pérez-Freire, Pedro Comesaña, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González:
Watermarking Security: A Survey. Trans. Data Hiding Multim. Secur. 1: 41-72 (2006) - [j2]Luis Pérez-Freire, Fernando Pérez-González, Teddy Furon, Pedro Comesaña:
Security of Lattice-Based Data Hiding Against the Known Message Attack. IEEE Trans. Inf. Forensics Secur. 1(4): 421-439 (2006) - [j1]Pedro Comesaña, Fernando Pérez-González, Félix Balado:
On distortion-compensated dither modulation data-hiding with repetition coding. IEEE Trans. Signal Process. 54(2): 585-600 (2006) - [c13]Pedro Comesaña, Luis Pérez-Freire, Fernando Pérez-González:
The blind Newton sensitivity attack. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60720E - [c12]Luis Pérez-Freire, Fernando Pérez-González, Pedro Comesaña:
Secret dither estimation in lattice-quantization data hiding: a set membership approach. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60720W - 2005
- [c11]Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Emre Topak, José-Emilio Vila-Forcén, Pedro Comesaña Alfaro, Thierry Pun:
On Reversibility of Random Binning Techniques: Multimedia Perspectives. Communications and Multimedia Security 2005: 108-118 - [c10]Luis Pérez-Freire, Pedro Comesaña, Fernando Pérez-González:
Information-Theoretic Analysis of Security in Side-Informed Data Hiding. Information Hiding 2005: 131-145 - [c9]Pedro Comesaña, Luis Pérez-Freire, Fernando Pérez-González:
Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis. Information Hiding 2005: 146-160 - [c8]Pedro Comesaña, Luis Pérez-Freire, Fernando Pérez-González:
The Return of the Sensitivity Attack. IWDW 2005: 260-274 - [c7]Pedro Comesaña, Fernando Pérez-González, Frans M. J. Willems:
Applying Erez and Ten Brink's dirty paper codes to data hiding. Security, Steganography, and Watermarking of Multimedia Contents 2005: 298-307 - [c6]Luis Pérez-Freire, Pedro Comesaña Alfaro, Fernando Pérez-González:
Detection in quantization-based watermarking: performance and security issues. Security, Steganography, and Watermarking of Multimedia Contents 2005: 721-733 - 2004
- [c5]Pedro Comesaña, Fernando Pérez-González:
Quantifying security leaks in spread spectrum data hiding: a game-theoretic approach. Security, Steganography, and Watermarking of Multimedia Contents 2004: 592-601 - [c4]Félix Balado, Fernando Pérez-González, Pedro Comesaña:
Blind iterative decoding of side-informed data hiding using the expectation-maximization algorithm. Security, Steganography, and Watermarking of Multimedia Contents 2004: 805-815 - 2003
- [c3]Pedro Comesaña, Fernando Pérez-González, Félix Balado:
Optimal strategies for spread-spectrum and quantized-projection image data hiding games with BER payoffs. ICIP (2) 2003: 479-482 - [c2]Fernando Pérez-González, Pedro Comesaña, Félix Balado:
Dither-modulation data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks. ICIP (2) 2003: 503-506 - [c1]Pedro Comesaña, Fernando Pérez-González, Félix Balado:
Optimal Data-Hiding Strategies for Games with BER Payoffs. IWDW 2003: 101-116
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-14 18:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint