Author of the publication

Fragile watermarking for authenticating 3-D polygonal meshes.

, , , and . IEEE Trans. Multim., 7 (6): 997-1006 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust non-interactive zero-knowledge watermarking scheme against cheating prover., and . MM&Sec, page 103-110. ACM, (2005)Shape from texture: estimation of planar surface orientation through the ridge surfaces of continuous wavelet transform., , and . IEEE Trans. Image Process., 7 (5): 773-780 (1998)Robust Image Deepfake Detection with Perceptual Hashing., and . ICISSP, page 374-378. SCITEPRESS, (2024)Media Hash-dependent Image Watermarking Resilent Against Both Geometric Attacks and Estimation Attacks Based on Fals Positive-Oriented Detection., , , and . ICDAT, page 155-174. (2005)Constraint-optimized keypoint inhibition/insertion attack: security threat to scale-space image feature extraction., and . ACM Multimedia, page 629-638. ACM, (2012)Highly Robust Image Watermarking Using Complementary Modulations., , , and . ISW, volume 1729 of Lecture Notes in Computer Science, page 136-153. Springer, (1999)Habitual Behavior-Based Opportunistic Data Forwarding in Wildlife Tracking., , and . ISWCS, page 807-808. IEEE, (2007)Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks., , and . VTC Fall, IEEE, (2009)Secure and robust sift with resistance to chosen-plaintext attack., , and . ICIP, page 997-1000. IEEE, (2010)Wyner-Ziv Video Coding with Coding Mode-Aided Motion Compensation., and . ICIP, page 237-240. IEEE, (2006)