Comesaña Alfaro

Senior Lecturer

Área of Signal Theory and Communications
Department of Signal Theory and Communications

Contact information

School of Telecommunications Engineering
Despacho A-204

As Lagoas, Marcosende
36310 Vigo

+34 986 818 655
pcomesan@gts.uvigo.es

 

Research results

Article
Vazquez-Padin, D., Perez-Gonzalez, F., Comesana-Alfaro, P.
A Random Matrix Approach to the Forensic Analysis of Upscaled Images
IEEE Transactions on Information Forensics and Security, 12, 9, 2017 | DOI

Article
Tondi, B., Comesaña-Alfaro, P., Perez-Gonzalez, F., Barni, M.
Smart Detection of Line-Search Oracle Attacks
IEEE Transactions on Information Forensics and Security, 12, 3, 2017 | DOI

Conference Paper
Vázquez-Padín, D., Pérez-González, F., Comesaña-Alfaro, P.
Random matrix theory for modeling the eigenvalue distribution of images under upscaling
Communications in Computer and Information Science, 766, , 2017 | DOI

Conference Paper
Espinoza, A.M., Knockel, J., Crandall, J.R., Comesaña-Alfaro, P.
V-DIFT: Vector-based dynamic information flow tracking with application to locating cryptographic keys for reverse engineering
Proceedings – 2016 11th International Conference on Availability, Reliability and Security, ARES 2016, , , 2016 | DOI

Conference Paper
Perez-Gonzalez, F., Masciopinto, M., Gonzalez-Iglesias, I., Comesana, P.
Fast sequential forensic detection of camera fingerprint
Proceedings – International Conference on Image Processing, ICIP, 2016-August, , 2016 | DOI

Conference Paper
Denemark, T., Fridrich, J., Comesaña-Alfaro, P.
Improving selection-channel-aware steganalysis features
IS and T International Symposium on Electronic Imaging Science and Technology, , , 2016 | DOI

Conference Paper
Goljan, M., Chen, M., Comesaña, P., Fridrich, J.
Effect of compression on sensor-fingerprint based camera identification
IS and T International Symposium on Electronic Imaging Science and Technology, , , 2016 | DOI

Conference Paper
Comesana, P., Perez-Gonzalez, F.
The optimal attack to histogram-based forensic detectors is simple(x)
2014 IEEE International Workshop on Information Forensics and Security, WIFS 2014, , , 2015 | DOI

Conference Paper
Tondi, B., Comesaña-Alfaro, P., Pérez-González, F., Barni, M.
On the effectiveness of meta-detection for countering oracle attacks in watermarking
2015 IEEE International Workshop on Information Forensics and Security, WIFS 2015 – Proceedings, , , 2015 | DOI

Conference Paper
Vazquez-Padin, D., Comesana, P., Perez-Gonzalez, F.
An SVD approach to forensic image resampling detection
2015 23rd European Signal Processing Conference, EUSIPCO 2015, , , 2015 | DOI

Article
Conotter, V., Comesaña, P., Pérez-González, F.
Forensic Detection of Processing Operator Chains: Recovering the History of Filtered JPEG Images
IEEE Transactions on Information Forensics and Security, 10, 11, 2015 | DOI

Conference Paper
Dominguez-Conde, G., Comesana-Alfaro, P., Perez-Gonzalez, F.
A new look at ML step-size estimation for Scalar Costa scheme data hiding
2014 IEEE International Conference on Image Processing, ICIP 2014, , , 2014 | DOI

Conference Paper
Domínguez-Conde, G., Comesaña-Alfaro, P., Pérez-González, F.
Flat fading channel estimation based on Dirty Paper Coding
ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing – Proceedings, , , 2014 | DOI

Conference Paper
Pasquini, C., Comesana-Alfaro, P., Perez-Gonzalez, F., Boato, G.
Transportation-theoretic image counterforensics to First Significant Digit histogram forensics
ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing – Proceedings, , , 2014 | DOI

Conference Paper
Barni, M., Comesana-Alfaro, P., Perez-Gonzalez, F., Tondi, B.
Are you threatening me?: Towards smart detectors in watermarking
Proceedings of SPIE – The International Society for Optical Engineering, 9028, , 2014 | DOI

Conference Paper
Comesaña, P., Pérez-González, F., Liste, N.
Quantization lattice estimation for multimedia forensics
2013 IEEE International Conference on Image Processing, ICIP 2013 – Proceedings, , , 2013 | DOI

Conference Paper
Conotter, V., Comesaña, P., Pérez-González, F.
Forensic analysis of full-frame linearly filtered JPEG images
2013 IEEE International Conference on Image Processing, ICIP 2013 – Proceedings, , , 2013 | DOI

Conference Paper
Conotter, V., Comesana, P., Perez-Gonzalez, F.
Joint detection of full-frame linear filtering and JPEG compression in digital images
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013, , , 2013 | DOI

Conference Paper
Vazquez-Padin, D., Comesana, P., Perez-Gonzalez, F.
Set-membership identification of resampled signals
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013, , , 2013 | DOI

Conference Paper
Comesaña, P., Pérez-González, F.
Taking advantage of source correlation in forensic analysis
2013 IEEE International Workshop on Multimedia Signal Processing, MMSP 2013, , , 2013 | DOI

Conference Paper
Comesana-Alfaro, P., Perez-Gonzalez, F.
Optimal counterforensics for histogram-based forensics
ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing – Proceedings, , , 2013 | DOI

Conference Paper
Comesaña, P., Pérez-González, F.
Multimedia operator chain topology and ordering estimation based on detection and information theoretic tools
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7809 LNCS, , 2013 | DOI

Conference Paper
Vázquez-Padín, D., Comesaña, P.
ML estimation of the resampling factor
WIFS 2012 – Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, , , 2012 | DOI

Conference Paper
Vázquez-Padín, D., Fontani, M., Bianchi, T., Comesaña, P., Piva, A., Barni, M.
Detection of video double encoding with GOP size estimation
WIFS 2012 – Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, , , 2012 | DOI

Conference Paper
Masciopinto, M., Comesaña, P.
IPTV streaming source classification
WIFS 2012 – Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, , , 2012 | DOI

Conference Paper
Comesaña, P.
Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains
WIFS 2012 – Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, , , 2012 | DOI

Conference Paper
Comesaña, P., Pérez-González, F., Abdallah, C.T.
Witsenhausen’s counterexample and its links with multimedia security problems
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7128 LNCS, , 2012 | DOI

Conference Paper
Comesaña, P., Pérez-González, F.
Weber’s law-based side-informed data hiding
ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing – Proceedings, , , 2011 | DOI

Conference Paper
Rodríguez-Piñeiro, J., Comesaña-Alfaro, P., Pérez-González, F., Malvido-García, A.
A new method for perspective correction of document images
Proceedings of SPIE – The International Society for Optical Engineering, 7874, , 2011 | DOI

Article
Comesaña, P., Merhav, N., Barni, M.
Asymptotically optimum universal watermark embedding and detection in the high-SNR regime
IEEE Transactions on Information Theory, 56, 6, 2010 | DOI

Conference Paper
Troncoso-Pastoriza, J.R., Comesaña, P., Pérez-Freire, L., Pérez-González, F.
Videosurveillance and privacy: Covering the two sides of the mirror with DRM
Proceedings of the ACM Conference on Computer and Communications Security, , , 2009 | DOI

Article
Dominguez-Conde, G., Comesana, P., Perez-Gonzalez, F.
Performance analysis of fridrichgoljan self-embedding authentication method
IEEE Transactions on Information Forensics and Security, 4, 3, 2009 | DOI

Conference Paper
Domínguez-Conde, G., Comesaña, P., Pérez-González, F.
Perfomance analysis of the Fridrich-Goljan self-embedding authentication method
Proceedings – International Conference on Image Processing, ICIP, , , 2009 | DOI

Conference Paper
Comesaña, P., Pérez-González, F.
Dither mdulation in the logarithmic domain
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5041 LNCS, , 2008 | DOI

Conference Paper
Comesaña, P., Merhav, N., Barni, M.
Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks
Proceedings of SPIE – The International Society for Optical Engineering, 6819, , 2008 | DOI

Conference Paper
González-Jiménez, D., Pérez-González, F., Comesaña-Alfaro, P., Pérez-Freiré, L., Alba-Castro, J.L.
Modeling gabor coefficients via generalized Gaussian distributions for face recognition
Proceedings – International Conference on Image Processing, ICIP, 4, , 2007 | DOI

Conference Paper
Comesaña, P., Pérez-González, F.
On a watermarking scheme in the logarithmic domain and its perceptual advantages
Proceedings – International Conference on Image Processing, ICIP, 2, , 2007 | DOI

Conference Paper
Comesaña, P., Pérez-González, F.
On the capacity of stegosystems
MM and Sec’07 – Proceedings of the Multimedia and Security Workshop 2007, , , 2007 | DOI

Conference Paper
Barni, M., Pérez-González, F., Comesaña, P., Bartoli, G.
Putting reproducible signal processing into practice: A case study in watermarking
ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing – Proceedings, 4, , 2007 | DOI

Conference Paper
González-Jiménez, D., Pérez-González, F., Comesaña-Alfaro, P., Pérez-Freiré, L., Alba-Castro, J.L.
Modeling gabor coefficients via generalized Gaussian distributions for face recognition
Proceedings – International Conference on Image Processing, ICIP, 4, , 2007 | DOI

Conference Paper
Comesaña, P., Pérez-González, F.
Two different approaches for attacking BOWS
Proceedings of SPIE – The International Society for Optical Engineering, 6505, , 2007 | DOI

Conference Paper
Comesaña, P., Balado, F., Pérez-González, F.
A novel interpretation of content authentication
Proceedings of SPIE – The International Society for Optical Engineering, 6505, , 2007 | DOI

Article
Pérez-Freire, L., Pérez-González, F., Furon, T., Comesaña, P.
Security of lattice-based data hiding against the known message attack
IEEE Transactions on Information Forensics and Security, 1, 4, 2006 | DOI

Article
Comesaña, P., Peérez-González, F.
The impact of the cropping attack on scalar STDM data hiding
IEEE Signal Processing Letters, 13, 6, 2006 | DOI

Conference Paper
Comesaña, P., Pérez-Freire, L., Pérez-González, F.
The blind newton sensitivity attack
Proceedings of SPIE – The International Society for Optical Engineering, 6072, , 2006 | DOI

Conference Paper
Pérez-Freire, L., Pérez-Gonzalez, F., Comesaña, P.
Secret dither estimation in lattice-quantization data hiding: A set-membership approach
Proceedings of SPIE – The International Society for Optical Engineering, 6072, , 2006 | DOI

Article
Comesaña, P., Pérez-González, F., Balado, F.
On distortion-compensated dither modulation data-hiding with repetition coding
IEEE Transactions on Signal Processing, 54, 2, 2006 | DOI

Conference Paper
Pérez-Freire, L., Comesaña, P., Troncoso-Pastoriza, J.R., Pérez-González, F.
Watermarking security: A survey
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4300 LNCS, , 2006 | DOI

Conference Paper
Pérez-Freire, L., Comesana, P., Pérez-González, F.
Information-theoretic analysis of security in side-informed data hiding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3727 LNCS, , 2006 | DOI

Conference Paper
Comesana, P., Pérez-Freire, L., Pérez-González, F.
Fundamentals of data hiding security and their application to spread-spectrum analysis
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3727 LNCS, , 2006 | DOI

Conference Paper
Comesaña, P., Pérez-González, F., Willems, F.M.J.
Applying Erez and ten Brink’s dirty paper codes to data-hiding
Proceedings of SPIE – The International Society for Optical Engineering, 5681, , 2005 | DOI

Conference Paper
Pérez-Freire, L., Comesaña-Alfaro, P., Pérez-González, F.
Detection in quantization-based watermarking: Performance and security issues
Proceedings of SPIE – The International Society for Optical Engineering, 5681, , 2005 | DOI

Conference Paper
Comesaña, P., Pérez-Freire, L., Pérez-González, F.
The return of the sensitivity attack
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3710 LNCS, , 2005 | DOI

Article
Comesaña, P., Pérez-González, F., Balado, F.
Optimal data-hiding strategies for games with BER payoffs
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2939, , 2004 | DOI

Conference Paper
Balado, F., Pérez-González, F., Comesaña, P.
Blind iterative decoding of side-informed data hiding using the expectation-maximization algorithm
Proceedings of SPIE – The International Society for Optical Engineering, 5306, , 2004 | DOI

Conference Paper
Comesaña, P., Pérez-González, F.
Quantifying security leaks in spread spectrum data hiding: A game-theoretic approach
Proceedings of SPIE – The International Society for Optical Engineering, 5306, , 2004 | DOI

Conference Paper
Pérez-González, F., Comesaña, P., Balado, F.
Dither-modulation data hiding with distortion-compensation: Exact performance analysis and an improved detector for JPEG attacks
IEEE International Conference on Image Processing, 2, , 2003 | DOI

Conference Paper
Comesaña, P., Pérez-González, F., Balado, F.
Optimal strategies for spread-spectrum and quantized-projection image data hiding games with BER payoffs
IEEE International Conference on Image Processing, 2, , 2003 | DOI