Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimum decoding and detection of a multiplicative amplitude-encoded watermark., , , and . Security and Watermarking of Multimedia Contents, volume 4675 of SPIE Proceedings, page 409-420. SPIE, (2002)Advantages and drawbacks of multiplicative spread spectrum watermarking., , and . Security and Watermarking of Multimedia Contents, volume 5020 of SPIE Proceedings, page 290-299. SPIE, (2003)Exploring image dependencies: a new challenge in image forensics., , , , and . Media Forensics and Security, volume 7541 of SPIE Proceedings, page 75410X. SPIE, (2010)Image counter-forensics based on feature injection., , , , , and . Media Watermarking, Security, and Forensics, volume 9028 of SPIE Proceedings, page 902810. SPIE, (2014)Capacity of full frame DCT image watermarks., , , and . IEEE Trans. Image Processing, 9 (8): 1450-1455 (2000)Detection and classification of double compressed MP3 audio tracks., , , , and . IH&MMSec, page 159-164. ACM, (2013)Detection and localization of double compression in MP3 audio tracks., , , , and . EURASIP J. Information Security, (2014)Investigating multimedia contents., , , and . ICCST, page 1-6. IEEE, (2014)A DWT-Based Object Watermarking System for MPEG-4 Video Streams., , and . ICIP, page 5-8. IEEE, (2000)Image segmentation and region filling for virtual restoration of artworks., , , and . ICIP (1), page 562-565. IEEE, (2001)