Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the systematic generation of Tardos's fingerprinting codes., , and . MMSP, page 748-753. IEEE Signal Processing Society, (2008)Enrichment of Visual Appearance of Aesthetic QR Code., and . IWDW, volume 9569 of Lecture Notes in Computer Science, page 220-231. Springer, (2015)A Watermarking Scheme Applicable for Fingerprinting Protocol., and . IWDW, volume 2939 of Lecture Notes in Computer Science, page 532-543. Springer, (2003)Experimental Assessment of Probabilistic Fingerprinting Codes over AWGN Channel.. IWSEC, volume 6434 of Lecture Notes in Computer Science, page 117-132. Springer, (2010)Near-Optimal Detection for Binary Tardos Code by Estimating Collusion Strategy., , , and . IEEE Trans. Inf. Forensics Secur., (2020)DeepFake Detection for Human Face Images and Videos: A Survey., , , and . IEEE Access, (2022)A Throughput Fairness Control Method for Concurrent Communications in Wireless Local-Area Network with Multiple Access-Points., , , , , and . J. Commun., 17 (8): 592-599 (2022)DISSIMILAR: Towards fake news detection using information hiding, signal processing and machine learning., , , and . ARES, page 66:1-66:9. ACM, (2021)An Implementation of Job Migration Function Using CRIU and Podman in Docker-based User-PC Computing System., , , , and . ICCCM, page 92-97. ACM, (2021)A Proposal of Transmission Power Optimization Method for Concurrently Communicating Two Access-Points in Wireless Local-Area Network., , , , , and . ICCE-TW, page 1-2. IEEE, (2020)