Author of the publication

Modeling the print-scan process for resilient data hiding.

, , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 418-429. SPIE, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scaling wideband distributed transmit beamforming via aggregate feedback., , and . ICC, page 2356-2362. IEEE, (2015)Analog processing to enable scalable high-throughput mm-Wave wireless fiber systems., , , and . ACSSC, page 1658-1662. IEEE, (2016)MIMO channel prediction results on outdoor collected data., , , and . ACSSC, page 592-596. IEEE, (2013)Noncoherent compressive channel estimation for mm-wave massive MIMO., and . ACSSC, page 889-894. IEEE, (2018)Analog multitone with interference suppression: Relieving the ADC bottleneck for wideband 60 GHz systems., , and . GLOBECOM, page 2305-2310. IEEE, (2012)Noncoherent eigenbeamforming for a wideband cellular uplink., , and . ISIT, page 381. IEEE, (2004)Distributed transmit beamforming with one bit feedback revisited: How noise limits scaling., , and . ISIT, page 2041-2045. IEEE, (2015)Can geographic routing scale when nodes are mobile?, and . ISIT, page 224-228. IEEE, (2012)Capacity maximization for distributed broadband beamforming., , , , and . ICASSP, page 3441-3445. IEEE, (2016)A framework for machine vision based on neuro-mimetic front end processing and clustering., , , and . Allerton, page 311-318. IEEE, (2014)