Fernando Pérez‐González
YOU?
Author Swipe
View article: Always-convex harmonic shears
Always-convex harmonic shears Open
We determine completely the analytic functions $φ$ in the unit disk $\mathbb D$ such that for all (normalized) orientation-preserving harmonic mappings $f=h+\overline g$ which satisfy $h+ g=φ$, the condition that $f$ maps $\mathbb D$ onto …
View article: Privacy-preserving framework for genomic computations via multi-key homomorphic encryption
Privacy-preserving framework for genomic computations via multi-key homomorphic encryption Open
Motivation The affordability of genome sequencing and the widespread availability of genomic data have opened up new medical possibilities. Nevertheless, they also raise significant concerns regarding privacy due to the sensitive informati…
View article: Exploring the Pitfalls of Black Boxes in Media Forensics: A Case Study in Source Camera Identification
Exploring the Pitfalls of Black Boxes in Media Forensics: A Case Study in Source Camera Identification Open
The increasing reliance on deep models as black-box solutions raises critical concerns, particularly in media forensics, where explainability and robustness are essential. These models often fail to address biases in experimental design, p…
View article: Exploring Federated Learning Dynamics for Black-and-White-Box DNN Traitor Tracing
Exploring Federated Learning Dynamics for Black-and-White-Box DNN Traitor Tracing Open
As deep learning applications become more prevalent, the need for extensive training examples raises concerns for sensitive, personal, or proprietary data. To overcome this, Federated Learning (FL) enables collaborative model training acro…
View article: Norm inequalities for weighted Dirichlet spaces with applications to conformal maps
Norm inequalities for weighted Dirichlet spaces with applications to conformal maps Open
A variety of norm inequalities related to Bergman and Dirichlet spaces induced by radial weights are considered. Some of the results obtained can be considered as generalizations of certain known special cases while most of the estimates d…
View article: An Adaptive Method for Camera Attribution Under Complex Radial Distortion Corrections
An Adaptive Method for Camera Attribution Under Complex Radial Distortion Corrections Open
Radial distortion correction, applied by in-camera or out-camera software/firmware alters the supporting grid of the image so as to hamper PRNU-based camera attribution. Existing solutions to deal with this problem try to invert/estimate t…
View article: Information Forensics and Security: A quarter-century-long journey
Information Forensics and Security: A quarter-century-long journey Open
Information Forensics and Security (IFS) is an active R&D area whose goal is to ensure that people use devices, data, and intellectual properties for authorized purposes and to facilitate the gathering of solid evidence to hold perpetrator…
View article: Towards Traitor Tracing in Black-and-White-Box DNN Watermarking with Tardos-based Codes
Towards Traitor Tracing in Black-and-White-Box DNN Watermarking with Tardos-based Codes Open
The growing popularity of Deep Neural Networks, which often require computationally expensive training and access to a vast amount of data, calls for accurate authorship verification methods to deter unlawful dissemination of the models an…
View article: Information Forensics and Security: A quarter-century-long journey
Information Forensics and Security: A quarter-century-long journey Open
Information forensics and security (IFS) is an active R&D area whose goal is to ensure that people use devices, data, and intellectual properties for authorized purposes and to facilitate the gathering of solid evidence to hold perpetrator…
View article: Introducing the TRUMPET project: TRUstworthy Multi-site Privacy Enhancing Technologies
Introducing the TRUMPET project: TRUstworthy Multi-site Privacy Enhancing Technologies Open
This paper is an overview of the EU-funded project TRUMPET (https://trumpetproject.eu/), and gives an outline of its scope and main technical aspects and objectives. In recent years, Federated Learning has emerged as a revolutionary privac…
View article: An Adaptive Method for Camera Attribution under Complex Radial Distortion Corrections
An Adaptive Method for Camera Attribution under Complex Radial Distortion Corrections Open
Radial correction distortion, applied by in-camera or out-camera software/firmware alters the supporting grid of the image so as to hamper PRNU-based camera attribution. Existing solutions to deal with this problem try to invert/estimate t…
View article: Source camera attribution via PRNU emphasis: Towards a generalized multiplicative model
Source camera attribution via PRNU emphasis: Towards a generalized multiplicative model Open
The photoresponse non-uniformity (PRNU) is a camera-specific pattern, which acts as unique fingerprint of any imaging sensor and thus is widely adopted to solve multimedia forensics problems such as device identification or forgery detecti…
View article: Gpu-Accelerated Sift-Aided Source Identification of Stabilized Videos
Gpu-Accelerated Sift-Aided Source Identification of Stabilized Videos Open
Video stabilization is an in-camera processing commonly applied by modern acquisition devices. While significantly improving the visual quality of the resulting videos, it has been shown that such operation typically hinders the forensic a…
View article: GPU-accelerated SIFT-aided source identification of stabilized videos
GPU-accelerated SIFT-aided source identification of stabilized videos Open
Video stabilization is an in-camera processing commonly applied by modern acquisition devices. While significantly improving the visual quality of the resulting videos, it has been shown that such operation typically hinders the forensic a…
View article: PRNU Emphasis: a Generalization of the Multiplicative Model
PRNU Emphasis: a Generalization of the Multiplicative Model Open
The photoresponse non-uniformity (PRNU) is a camera-specific pattern, widely adopted to solve multimedia forensics problems such as device identification or forgery detection. The theoretical analysis of this fingerprint customarily relies…
View article: Integral means of derivatives of univalent functions in Hardy spaces
Integral means of derivatives of univalent functions in Hardy spaces Open
We show that the norm in the Hardy space $H^p$ satisfies \begin{equation}\label{absteq} \|f\|_{H^p}^p\asymp\int_0^1M_q^p(r,f')(1-r)^{p\left(1-\frac1q\right)}\,dr+|f(0)|^p\tag† \end{equation} for all univalent functions provided that either…
View article: On the information leakage quantification of camera fingerprint estimates
On the information leakage quantification of camera fingerprint estimates Open
Camera fingerprints based on sensor PhotoResponse Non-Uniformity (PRNU) have gained broad popularity in forensic applications due to their ability to univocally identify the camera that captured a certain image. The fingerprint of a given …
View article: Revisiting Multivariate Ring Learning with Errors and Its Applications on Lattice-Based Cryptography
Revisiting Multivariate Ring Learning with Errors and Its Applications on Lattice-Based Cryptography Open
The “Multivariate Ring Learning with Errors” problem was presented as a generalization of Ring Learning with Errors (RLWE), introducing efficiency improvements with respect to the RLWE counterpart thanks to its multivariate structure. Neve…
View article: Revisiting Multivariate Ring Learning with Errors and Its Applications on Lattice-Based Cryptography
Revisiting Multivariate Ring Learning with Errors and Its Applications on Lattice-Based Cryptography Open
The “Multivariate Ring Learning with Errors” problem was presented as a generalization of Ring Learning with Errors (RLWE), introducing efficiency improvements with respect to the RLWE counterpart thanks to its multivariate structure. Neve…
View article: Adam and the Ants: On the Influence of the Optimization Algorithm on the Detectability of DNN Watermarks
Adam and the Ants: On the Influence of the Optimization Algorithm on the Detectability of DNN Watermarks Open
As training Deep Neural Networks (DNNs) becomes more expensive, the interest in protecting the ownership of the models with watermarking techniques increases. Uchida et al. proposed a digital watermarking algorithm that embeds the secret m…
View article: Multiquadratic Rings and Walsh-Hadamard Transforms for Oblivious Linear Function Evaluation
Multiquadratic Rings and Walsh-Hadamard Transforms for Oblivious Linear Function Evaluation Open
The Ring Learning with Errors (RLWE) problem has become one of the most widely used cryptographic assumptions for the construction of modern cryptographic primitives. Most of these solutions make use of power-of-two cyclotomic rings mainly…
View article: On the Information Leakage of Camera Fingerprint Estimates
On the Information Leakage of Camera Fingerprint Estimates Open
Camera fingerprints based on sensor PhotoResponse Non-Uniformity (PRNU) have gained broad popularity in forensic applications due to their ability to univocally identify the camera that captured a certain image. This fingerprint of a given…
View article: ENF Moving Video Database
ENF Moving Video Database Open
Moving Video Database. MP4 files correspond to video files. WAV files are the voltage signals obtained from the mains. The recording time of the MP4 files and they WAV reference is very similar. Three types of videos are considered: MOV1 a…
View article: ENF Moving Video Database
ENF Moving Video Database Open
Moving Video Database. MP4 files correspond to video files. WAV files are the voltage signals obtained from the mains. The recording time of the MP4 files and they WAV reference is very similar. Three types of videos are considered: MOV1 a…
View article: Filter Design for Delay-Based Anonymous Communications
Filter Design for Delay-Based Anonymous Communications Open
In this work, we address the problem of designing delay-based anonymous communication systems. We consider a timed mix where an eavesdropper wants to learn the communication pattern of the users, and study how the mix must delay the messag…
View article: Efficient PRNU Matching in the Encrypted Domain
Efficient PRNU Matching in the Encrypted Domain Open
Photoresponse Non-Uniformity (PRNU) is becoming particularly relevant within digital media forensics, as a means to effectively determine the source camera of a given image. Most of the practical applications in digital media forensics inv…
View article: Revisiting Multivariate Lattices for Encrypted Signal Processing
Revisiting Multivariate Lattices for Encrypted Signal Processing Open
Multimedia contents are inherently sensitive signals that must be protected when processed in untrusted environments. The field of Secure Signal Processing addresses this challenge by developing methods which enable operating with sensitiv…
View article: MPEG-2 Prediction Residue Analysis
MPEG-2 Prediction Residue Analysis Open
Based on the use of synthetic signals and autoregressive models to characterize temporal dependencies and inter prediction processes, a semi-analytic model is built to explain the evolution of the prediction residue in MPEG-2 double compre…