Author of the publication

A solution to gain attack onwatermarking systems: Logarithmic Homogeneous Rational Dither Modulation.

, , , and . ICASSP, page 1746-1749. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital image self-recovery using unequal error protection., , and . EUSIPCO, page 71-75. IEEE, (2015)Distribution independent blind watermarking., , and . ICIP, page 125-128. IEEE, (2009)Brand Visibility in Packaging: A Deep Learning Approach for Logo Detection, Saliency-Map Prediction, and Logo Placement Analysis., , , , , , and . CoRR, (2024)Improvement on Bitcoin's Verifiable Public Randomness with Semi-Trusted Delegates., , , and . IST, page 53-57. IEEE, (2018)Application Detection in Anonymous Communication Networks., and . CECC, page 12:1-12:5. ACM, (2018)Optimum decoder for an additive video watermarking with Laplacian noise in H.264., , and . ISCISC, page 1-5. IEEE, (2013)Timing mismatch compensation in TI-ADCS using Bayesian approach., , and . EUSIPCO, page 1391-1395. IEEE, (2015)An invertible quantization based watermarking approach., , and . ICASSP, page 1677-1680. IEEE, (2008)Robust Multiplicative Patchwork Method for audio watermarking., , , and . DPS, page 1-4. IEEE, (2009)Joint Compensation of Jitter Noise and Time-Shift Errors in Multichannel Sampling System., , and . IEEE Trans. Instrumentation and Measurement, 68 (10): 3932-3941 (2019)