Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multibit digital watermarking robust against local nonlinear geometrical distortions., , and . ICIP (3), page 999-1002. IEEE, (2001)Information-theoretic analysis of electronic and printed document authentication., , , , , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60721D. SPIE, (2006)Quantization-based watermarking performance improvement using host statistics: AWGN attack case., , , , and . MM&Sec, page 35-39. ACM, (2004)Statistical analysis of digital image fingerprinting based on random projections., , , , and . ISPA, page 200-205. IEEE, (2011)The Gaussian Transform of Distributions: Definition, Computation and Application., , and . IEEE Trans. Signal Process., 54 (8): 2976-2985 (2006)Second Generation Benchmarking and Application Oriented Evaluation., , , , and . Information Hiding, volume 2137 of Lecture Notes in Computer Science, page 340-353. Springer, (2001)Fundamental limits of identification: Identification rate, search and memory complexity trade-off., , and . ISIT, page 1252-1256. IEEE, (2013)Privacy amplification of content identification systems based on fingerprint bit reliability., , , , and . WIFS, page 1-6. IEEE, (2010)The Gaussian Transform., , and . EUSIPCO, page 1-4. IEEE, (2005)Capacity analysis of periodical watermarking., , , and . EUSIPCO, page 265-268. IEEE, (2004)