default search action
Luis Pérez-Freire
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [c21]Carlos Ruiz, Sinuhe Arroyo, Igor Krsteski, Pablo Dago, J. Sánchez, Luis Pérez-Freire, Alessia De Rosa, Marco Fontani, Andrea Costanzo, Alessandro Piva, Davide Ariu, Luca Piras, Raimundo Ahumada, Martino Jerian:
The maven project: Management and Authenticity Verification of multimedia contents. ICME Workshops 2015: 1-4 - 2013
- [c20]Enrique Argones-Rúa, Francisco Javier García Salomón, Luis Pérez-Freire:
Gradiant asymmetric encryption and verification systems based on handwritten signature. CCS 2013: 1349-1350 - 2011
- [c19]Esteban Vázquez-Fernández, Hugo Garcia-Pardo, Daniel González-Jiménez, Luis Pérez-Freire:
Built-in face recognition for smart photo sharing in mobile devices. ICME 2011: 1-4
2000 – 2009
- 2009
- [j5]Luis Pérez-Freire, Fernando Pérez-González:
Spread-spectrum watermarking security. IEEE Trans. Inf. Forensics Secur. 4(1): 2-24 (2009) - [c18]Juan Ramón Troncoso-Pastoriza, Pedro Comesaña, Luis Pérez-Freire, Fernando Pérez-González:
Videosurveillance and privacy: covering the two sides of the mirror with DRM. Digital Rights Management Workshop 2009: 83-94 - [c17]Teddy Furon, Luis Pérez-Freire, Arnaud Guyader, Frédéric Cérou:
Estimating the Minimal Length of Tardos Code. Information Hiding 2009: 176-190 - [c16]Teddy Furon, Luis Pérez-Freire:
EM decoding of tardos traitor tracing codes. MM&Sec 2009: 99-106 - [c15]Luis Pérez-Freire, Teddy Furon:
Blind decoder for binary probabilistic traitor tracing codes. WIFS 2009: 46-50 - [c14]Teddy Furon, Luis Pérez-Freire:
Worst case attacks against binary probabilistic traitor tracing codes. WIFS 2009: 56-60 - [i1]Teddy Furon, Luis Pérez-Freire:
Worst case attacks against binary probabilistic traitor tracing codes. CoRR abs/0903.3480 (2009) - 2008
- [j4]Luis Pérez-Freire, Fernando Pérez-González:
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack. IEEE Trans. Inf. Forensics Secur. 3(4): 593-610 (2008) - 2007
- [c13]Daniel González-Jiménez, Fernando Pérez-González, Pedro Comesaña Alfaro, Luis Pérez-Freire, José Luis Alba-Castro:
Modeling Gabor Coefficients via Generalized Gaussian Distributions for Face Recognition. ICIP (4) 2007: 485-488 - [c12]Luis Pérez-Freire, Fernando Pérez-González:
Exploiting Security Holes in Lattice Data Hiding. Information Hiding 2007: 159-173 - [c11]Luis Pérez-Freire, Pierre Moulin, Fernando Pérez-González:
Security of spread-spectrum-based data hiding. Security, Steganography, and Watermarking of Multimedia Contents 2007: 65050F - 2006
- [j3]Luis Pérez-Freire, Pedro Comesaña, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González:
Watermarking Security: A Survey. Trans. Data Hiding Multim. Secur. 1: 41-72 (2006) - [j2]Luis Pérez-Freire, Fernando Pérez-González, Sviatoslav Voloshynovskiy:
An accurate analysis of scalar quantization-based data hiding. IEEE Trans. Inf. Forensics Secur. 1(1): 80-86 (2006) - [j1]Luis Pérez-Freire, Fernando Pérez-González, Teddy Furon, Pedro Comesaña:
Security of Lattice-Based Data Hiding Against the Known Message Attack. IEEE Trans. Inf. Forensics Secur. 1(4): 421-439 (2006) - [c10]Luis Pérez-Freire, Fernando Pérez-González, Teddy Furon:
On achievable security levels for lattice data hiding in the known message attack scenario. MM&Sec 2006: 68-79 - [c9]Pedro Comesaña, Luis Pérez-Freire, Fernando Pérez-González:
The blind Newton sensitivity attack. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60720E - [c8]Luis Pérez-Freire, Fernando Pérez-González, Pedro Comesaña:
Secret dither estimation in lattice-quantization data hiding: a set membership approach. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60720W - 2005
- [c7]Luis Pérez-Freire, Pedro Comesaña, Fernando Pérez-González:
Information-Theoretic Analysis of Security in Side-Informed Data Hiding. Information Hiding 2005: 131-145 - [c6]Pedro Comesaña, Luis Pérez-Freire, Fernando Pérez-González:
Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis. Information Hiding 2005: 146-160 - [c5]Pedro Comesaña, Luis Pérez-Freire, Fernando Pérez-González:
The Return of the Sensitivity Attack. IWDW 2005: 260-274 - [c4]Luis Pérez-Freire, Fernando Pérez-González:
Spread-spectrum vs. quantization-based data hiding: misconceptions and implications. Security, Steganography, and Watermarking of Multimedia Contents 2005: 341-352 - [c3]Luis Pérez-Freire, Pedro Comesaña Alfaro, Fernando Pérez-González:
Detection in quantization-based watermarking: performance and security issues. Security, Steganography, and Watermarking of Multimedia Contents 2005: 721-733 - 2004
- [c2]Luis Pérez-Freire, Carmen García-Mateo:
A multimedia approach for audio segmentation in TV broadcast news. ICASSP (1) 2004: 369-372 - [c1]Luis Pérez-Freire, Fernando Pérez-González, Sviatoslav Voloshynovskiy:
Revealing the true achievable rates of scalar Costa scheme. MMSP 2004: 203-206
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-15 00:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint