Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A hybrid scheme for encryption and watermarking., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 725-736. SPIE, (2004)Robust DCT-SVD domain image watermarking for copyright protection: Embedding data in all frequencies., , and . EUSIPCO, page 1-4. IEEE, (2005)Protecting Intellectual Property in Digital Multimedia Networks.. Computer, 36 (7): 39-45 (2003)Image quality measures and their performance, and . IEEE Transactions on Communications, 43 (12): 2959-2965 (1995)Key transport protocol based on secret sharing: an application to conditional access systems.. Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 139-148. SPIE, (2001)Robust Block-based Image Watermarking in Curvelet Transform., and . IIH-MSP, page 323-328. IEEE Computer Society, (2007)Application of Multi-Dimensional Quality Measures to Reconstructed Medical Images.. CBMS, page 6-15. IEEE Computer Society, (1995)Embedding multiple watermarks in the DFT domain using low- and high-frequency bands., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 175-184. SPIE, (2005)Naïve Bayes Classifier Based Watermark Detection in Wavelet Transform., and . MRCS, volume 4105 of Lecture Notes in Computer Science, page 232-240. Springer, (2006)Multimedia security in group communications: recent progress in key management, authentication, and watermarking.. Multim. Syst., 9 (3): 239-248 (2003)