Author of the publication

Visual communications with side information via distributed printing channels: extended multimedia and security perspectives.

, , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 428-445. SPIE, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantization-based watermarking performance improvement using host statistics: AWGN attack case., , , , and . MM&Sec, page 35-39. ACM, (2004)Information-theoretic analysis of electronic and printed document authentication., , , , , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60721D. SPIE, (2006)Multibit digital watermarking robust against local nonlinear geometrical distortions., , and . ICIP (3), page 999-1002. IEEE, (2001)Multi-layer Architecture For Storing Visual Data Based on WCF and Microsoft SQL Server Database., , , and . ICAISC (1), volume 9119 of Lecture Notes in Computer Science, page 715-726. Springer, (2015)Performance analysis of Bag-of-Features based content identification systems., , and . ICASSP, page 3799-3803. IEEE, (2014)The Gaussian Transform., , and . EUSIPCO, page 1-4. IEEE, (2005)Capacity analysis of periodical watermarking., , , and . EUSIPCO, page 265-268. IEEE, (2004)Content adaptive watermarking based on a stochastic multiresolution image modeling., , and . EUSIPCO, page 1-4. IEEE, (2000)Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics., , and . Communications and Multimedia Security, volume 3677 of Lecture Notes in Computer Science, page 273-274. Springer, (2005)Fundamental limits of identification: Identification rate, search and memory complexity trade-off., , and . ISIT, page 1252-1256. IEEE, (2013)