From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Information-theoretic analysis of electronic and printed document authentication., , , , , , , и . Security, Steganography, and Watermarking of Multimedia Contents, том 6072 из SPIE Proceedings, стр. 60721D. SPIE, (2006)Quantization-based watermarking performance improvement using host statistics: AWGN attack case., , , , и . MM&Sec, стр. 35-39. ACM, (2004)The Gaussian Transform of Distributions: Definition, Computation and Application., , и . IEEE Trans. Signal Process., 54 (8): 2976-2985 (2006)Second Generation Benchmarking and Application Oriented Evaluation., , , , и . Information Hiding, том 2137 из Lecture Notes in Computer Science, стр. 340-353. Springer, (2001)Multibit digital watermarking robust against local nonlinear geometrical distortions., , и . ICIP (3), стр. 999-1002. IEEE, (2001)Statistical analysis of digital image fingerprinting based on random projections., , , , и . ISPA, стр. 200-205. IEEE, (2011)Conception and limits of robust perceptual hashing: towards side information assisted hash functions., , , и . Media Forensics and Security, том 7254 из SPIE Proceedings, стр. 72540D. SPIE, (2009)Watermark template attack., , и . Security and Watermarking of Multimedia Contents, том 4314 из SPIE Proceedings, стр. 394-405. SPIE, (2001)StegoWall: blind statistical detection of hidden data., , , и . Security and Watermarking of Multimedia Contents, том 4675 из SPIE Proceedings, стр. 57-68. SPIE, (2002)Privacy amplification of content identification systems based on fingerprint bit reliability., , , , и . WIFS, стр. 1-6. IEEE, (2010)