From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Countermeasures for unintentional and intentional video watermarking attacks., , и . Security and Watermarking of Multimedia Contents, том 3971 из SPIE Proceedings, стр. 346-357. SPIE, (2000)A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking., , , и . Information Hiding, том 1768 из Lecture Notes in Computer Science, стр. 270-285. Springer, (1999)Method for the estimation and recovering from general affine transforms in digital watermarking applications., , и . Security and Watermarking of Multimedia Contents, том 4675 из SPIE Proceedings, стр. 313-322. SPIE, (2002)Data hiding capacity analysis for real images based on stochastic nonstationary geometrical models., , , и . Security and Watermarking of Multimedia Contents, том 5020 из SPIE Proceedings, стр. 580-593. SPIE, (2003)Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding., , , , и . Security, Steganography, and Watermarking of Multimedia Contents, том 6505 из SPIE Proceedings, стр. 65051T. SPIE, (2007)Hybrid robust watermarking resistant against copy attack., , и . EUSIPCO, стр. 1-4. IEEE, (2002)Spread spectrum watermarking for real images: Is everything so hopeless?, , , , и . EUSIPCO, стр. 1477-1480. IEEE, (2004)Visual communications with side information via distributed printing channels: extended multimedia and security perspectives., , , и . Security, Steganography, and Watermarking of Multimedia Contents, том 5306 из Proceedings of SPIE, стр. 428-445. SPIE, (2004)Optimal adaptive diversity watermarking with channel state estimation., , , и . Security and Watermarking of Multimedia Contents, том 4314 из SPIE Proceedings, стр. 673-685. SPIE, (2001)A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents., , , , , , , и . Communications and Multimedia Security, том 3677 из Lecture Notes in Computer Science, стр. 280-281. Springer, (2005)