Author of the publication

Trellis-Coded Rational Dither Modulation for Digital Watermarking.

, , , and . IWDW, volume 3710 of Lecture Notes in Computer Science, page 351-360. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ArtShop: an art-oriented image-processing tool for cultural heritage applications., , , , and . Comput. Animat. Virtual Worlds, 14 (3): 149-158 (2003)Identification of VoIP Speech With Multiple Domain Deep Features., , , and . IEEE Trans. Inf. Forensics Secur., (2020)CNN-Based Adversarial Embedding for Image Steganography., , , , and . IEEE Trans. Inf. Forensics Secur., 14 (8): 2074-2087 (2019)On the implementation of the discrete Fourier transform in the encrypted domain., , and . IEEE Trans. Inf. Forensics Secur., 4 (1): 86-97 (2009)Watermark-Based Authentication., , and . Intelligent Multimedia Analysis for Security Applications, volume 282 of Studies in Computational Intelligence, Springer, (2010)A Full-Reference Quality Metric for Geometrically Distorted Images., , and . IEEE Trans. Image Process., 19 (4): 867-881 (2010)Attacking CNN-based anti-spoofing face authentication in the physical domain., , and . CoRR, (2019)Low-complexity lossy compression of hyperspectral images via informed quantization., , and . ICIP, page 505-508. IEEE, (2010)A compressive-sensing based watermarking scheme for sparse image tampering identification., , , , and . ICIP, page 1265-1268. IEEE, (2009)Compressive hyperspectral imaging using progressive total variation., , , , and . ICASSP, page 7794-7798. IEEE, (2014)