Author of the publication

Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis.

, , , , , , , and . Security Protocols Workshop, volume 2133 of Lecture Notes in Computer Science, page 238-248. Springer, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Tezuka, Satoru
add a person with the name Tezuka, Satoru
 

Other publications of authors with the same name

Print traceability systems framework using digital watermarks for binary images., , , , and . SMC (4), page 3285-3290. IEEE, (2004)Use of inferential statistics to estimate error probability of video watermarks., , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 391-399. SPIE, (2005)Use of Gap-Filling Operation to Enhance Image Quality of Binary Image Watermarking., , , , and . IIH-MSP, page 25-28. IEEE Computer Society, (2007)Seamless Object Authentication in Different Security Policy Domains., , and . HICSS, IEEE Computer Society, (2000)Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis., , , , , , , and . Security Protocols Workshop, volume 2133 of Lecture Notes in Computer Science, page 238-248. Springer, (2000)PC-based real-time watermark embedding system with standard video interface., , , , , and . SMC, page 267-271. IEEE, (2006)Correlation-based model of color picture watermarking against random geometric distortion., , , , and . ICME, page 213-216. IEEE Computer Society, (2005)Use of Motion Estimation to Improve Video Watermarking for MPEG Encoders., , , and . IWDW, volume 2939 of Lecture Notes in Computer Science, page 184-199. Springer, (2003)Real-time video watermark embedding system using software on personal computer., , , , and . SMC, page 3369-3373. IEEE, (2005)A study on user authentication infrastructure for next generation telematics., , , and . ICVES, page 38-44. IEEE, (2008)