Author of the publication

Second Generation Benchmarking and Application Oriented Evaluation.

, , , , and . Information Hiding, volume 2137 of Lecture Notes in Computer Science, page 340-353. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information-theoretic analysis of electronic and printed document authentication., , , , , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60721D. SPIE, (2006)The Gaussian Transform of Distributions: Definition, Computation and Application., , and . IEEE Trans. Signal Process., 54 (8): 2976-2985 (2006)Statistical analysis of digital image fingerprinting based on random projections., , , , and . ISPA, page 200-205. IEEE, (2011)Second Generation Benchmarking and Application Oriented Evaluation., , , , and . Information Hiding, volume 2137 of Lecture Notes in Computer Science, page 340-353. Springer, (2001)Multi-layer Architecture For Storing Visual Data Based on WCF and Microsoft SQL Server Database., , , and . ICAISC (1), volume 9119 of Lecture Notes in Computer Science, page 715-726. Springer, (2015)Watermark template attack., , and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 394-405. SPIE, (2001)StegoWall: blind statistical detection of hidden data., , , and . Security and Watermarking of Multimedia Contents, volume 4675 of SPIE Proceedings, page 57-68. SPIE, (2002)Conception and limits of robust perceptual hashing: towards side information assisted hash functions., , , and . Media Forensics and Security, volume 7254 of SPIE Proceedings, page 72540D. SPIE, (2009)Privacy amplification of content identification systems based on fingerprint bit reliability., , , , and . WIFS, page 1-6. IEEE, (2010)Performance analysis of Bag-of-Features based content identification systems., , and . ICASSP, page 3799-3803. IEEE, (2014)