Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the implementation of the discrete Fourier transform in the encrypted domain., , and . IEEE Trans. Inf. Forensics Secur., 4 (1): 86-97 (2009)Identification of VoIP Speech With Multiple Domain Deep Features., , , and . IEEE Trans. Inf. Forensics Secur., (2020)CNN-Based Adversarial Embedding for Image Steganography., , , , and . IEEE Trans. Inf. Forensics Secur., 14 (8): 2074-2087 (2019)ArtShop: an art-oriented image-processing tool for cultural heritage applications., , , , and . Comput. Animat. Virtual Worlds, 14 (3): 149-158 (2003)Watermark-Based Authentication., , and . Intelligent Multimedia Analysis for Security Applications, volume 282 of Studies in Computational Intelligence, Springer, (2010)A Full-Reference Quality Metric for Geometrically Distorted Images., , and . IEEE Trans. Image Process., 19 (4): 867-881 (2010)Analysis of the security of linear blinding techniques from an information theoretical point of view., , and . ICASSP, page 5852-5855. IEEE, (2011)Steganography in Digital Media: Principles, Algorithms, and Applications (Fridrich, J. 2010) Book Reviews.. IEEE Signal Process. Mag., 28 (5): 142-144 (2011)A gradient-based pixel-domain attack against SVM detection of global image manipulations., , , , , and . WIFS, page 1-6. IEEE, (2017)Enhancing Privacy in Remote Data Classification., , , , and . SEC, volume 278 of IFIP, page 33-46. Springer, (2008)