Author of the publication

Streaming video and rate-scalable compression: What are the challenges for watermarking?

, , , and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 116-127. SPIE, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Perceptual watermarks for digital images and video., , and . Security and Watermarking of Multimedia Contents, volume 3657 of SPIE Proceedings, page 40-53. SPIE, (1999)A two-stage classifier system for normal mammogram identification., , and . Computational Imaging, volume 5299 of SPIE Proceedings, page 112-122. SPIE, (2004)Temporal synchronization in video watermarking., and . Security and Watermarking of Multimedia Contents, volume 4675 of SPIE Proceedings, page 478-490. SPIE, (2002)Temporal synchronization in video watermarking: further studies., and . Security and Watermarking of Multimedia Contents, volume 5020 of SPIE Proceedings, page 493-504. SPIE, (2003)Detection of image alterations using semifragile watermarks., , and . Security and Watermarking of Multimedia Contents, volume 3971 of SPIE Proceedings, page 152-163. SPIE, (2000)Streaming video and rate-scalable compression: What are the challenges for watermarking?, , , and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 116-127. SPIE, (2001)Protection of multicast scalable video by secret sharing: simulation results., , and . Security and Watermarking of Multimedia Contents, volume 5020 of SPIE Proceedings, page 505-515. SPIE, (2003)Overview of multimedia content protection in consumer electronics devices., and . Security and Watermarking of Multimedia Contents, volume 3971 of SPIE Proceedings, page 246-263. SPIE, (2000)Detection of mass tumors in mammograms using SVD subspace analysis., , and . Computational Imaging, volume 5674 of SPIE Proceedings, page 187-198. SPIE, (2005)Fragile watermarking using the VW2D watermark., and . Security and Watermarking of Multimedia Contents, volume 3657 of SPIE Proceedings, page 204-213. SPIE, (1999)