Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantization-based watermarking performance improvement using host statistics: AWGN attack case., , , , and . MM&Sec, page 35-39. ACM, (2004)Statistical analysis of digital image fingerprinting based on random projections., , , , and . ISPA, page 200-205. IEEE, (2011)Information-theoretic analysis of electronic and printed document authentication., , , , , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60721D. SPIE, (2006)Capacity analysis of periodical watermarking., , , and . EUSIPCO, page 265-268. IEEE, (2004)Privacy amplification of content identification systems based on fingerprint bit reliability., , , , and . WIFS, page 1-6. IEEE, (2010)Conception and limits of robust perceptual hashing: towards side information assisted hash functions., , , and . Media Forensics and Security, volume 7254 of SPIE Proceedings, page 72540D. SPIE, (2009)Security analysis of robust data-hiding with geometrically structured codebooks., , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 709-720. SPIE, (2005)On reversibility of random binning based data-hiding techniques: security perspectives., , , , and . MM&Sec, page 89-96. ACM, (2006)Statistical analysis of binarized SIFT descriptors., , , and . ISPA, page 460-465. IEEE, (2011)Active content fingerprinting: A marriage of digital watermarking and content fingerprinting., , , and . WIFS, page 175-180. IEEE, (2012)