Author of the publication

Ensuring gain-invariance in high-rate data hiding.

, , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 206-217. SPIE, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Convergence analysis of the multiple-channel filtered-U recursive LMS algorithm for active noise control, and . Signal Processing, 80 (5): 849--856 (May 2000)Report on Dirty Paper Coding Estimation with multidimensional lattices., and . CoRR, (2016)On achievable security levels for lattice data hiding in the known message attack scenario., , and . MM&Sec, page 68-79. ACM, (2006)Quantization-based watermarking performance improvement using host statistics: AWGN attack case., , , , and . MM&Sec, page 35-39. ACM, (2004)MPEG-2 Prediction Residue Analysis., and . CoRR, (2019)On the co-existence of primary and secondary transmitters in a broadcast network., , and . CogART, page 27. ACM, (2011)Putting the PRNU Model in Reverse Gear: Findings with Synthetic Signals., and . EUSIPCO, page 1352-1356. IEEE, (2018)Dither-modulation data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks., , and . ICIP (2), page 503-506. IEEE, (2003)Optimal strategies for spread-spectrum and quantized-projection image data hiding games with BER payoffs., , and . ICIP (2), page 479-482. IEEE, (2003)Quantized projection data hiding., and . ICIP (2), page 889-892. IEEE, (2002)