Author of the publication

A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents.

, , , , , , , and . Communications and Multimedia Security, volume 3677 of Lecture Notes in Computer Science, page 280-281. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Achievable rate analysis of geometrically robust data-hiding codes in asymptotic set-ups., , , and . EUSIPCO, page 1-4. IEEE, (2005)Security analysis of robust data-hiding with geometrically structured codebooks., , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 709-720. SPIE, (2005)On reversibility of random binning based data-hiding techniques: security perspectives., , , , and . MM&Sec, page 89-96. ACM, (2006)Information-theoretic analysis of electronic and printed document authentication., , , , , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60721D. SPIE, (2006)Capacity analysis of periodical watermarking., , , and . EUSIPCO, page 265-268. IEEE, (2004)Towards geometrically robust data-hiding with structured codebooks., , , , and . Multim. Syst., 11 (2): 121-132 (2005)Text data-hiding for digital and printed documents: theoretical and practical considerations., , , , , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 607212. SPIE, (2006)Asymmetrically informed data-hiding optimization of achievable rate for Laplacian host., , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60721F. SPIE, (2006)E-capacity analysis of data-hiding channels with geometrical attacks., , , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 607213. SPIE, (2006)Document forensics based on steganographic anti-counterfeiting markings and mobile architectures., , , , and . e-Forensics, page 28. ICST/ACM, (2008)