Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts., and . Information Hiding, volume 7692 of Lecture Notes in Computer Science, page 78-93. Springer, (2012)The square root law of steganographic capacity., , , and . MM&Sec, page 107-116. ACM, (2008)On dangers of overtraining steganography to incomplete cover model., , and . MM&Sec, page 69-76. ACM, (2011)Influence of embedding strategies on security of steganographic methods in the JPEG domain., and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 681902. SPIE, (2008)Breaking HUGO - The Process Discovery., , , and . Information Hiding, volume 6958 of Lecture Notes in Computer Science, page 85-101. Springer, (2011)Steganalysis in resized images., and . ICASSP, page 2857-2861. IEEE, (2013)Calibration revisited., and . MM&Sec, page 63-74. ACM, (2009)Steganalysis in high dimensions: fusing classifiers built on random subspaces., and . Media Forensics and Security, volume 7880 of SPIE Proceedings, page 78800L. SPIE, (2011)Steganalysis of JPEG images using rich models., and . Media Watermarking, Security, and Forensics, volume 8303 of SPIE Proceedings, page 83030A. SPIE, (2012)Steganalysis of LSB Replacement Using Parity-Aware Features., and . Information Hiding, volume 7692 of Lecture Notes in Computer Science, page 31-45. Springer, (2012)