Author of the publication

Capacity of digital watermarks subjected to an optimal collusion attack.

, , and . EUSIPCO, page 1-4. IEEE, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance of a practical blind watermarking scheme., , and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 594-605. SPIE, (2001)Public key watermarking by eigenvectors of linear transforms., , and . EUSIPCO, page 1-4. IEEE, (2000)On the Robustness and Imperceptibility of Digital Fingerprints., and . ICMCS, Vol. 2, page 530-535. IEEE Computer Society, (1999)0-7695-0253-9.Fundamental performance limits of power-spectrum condition-compliant watermarks., and . Security and Watermarking of Multimedia Contents, volume 3971 of SPIE Proceedings, page 314-325. SPIE, (2000)Analysis of digital watermarks subjected to optimum linear filtering and additive noise., , and . Signal Process., 81 (6): 1141-1175 (2001)Non-Iterative Rate-Constrained Motion Estimation for OBMC*., and . ICIP (2), page 33-36. IEEE Computer Society, (1997)Coding using Gaussian mixture and generalized Gaussian models., and . ICIP (1), page 217-220. IEEE Computer Society, (1996)Power Spectrum Condition for Energy-Efficient Watermarking., and . ICIP (1), page 301-305. IEEE, (1999)Robustness of a Blind Image Watermarking Scheme., , and . ICIP, page 17-20. IEEE, (2000)Predicting Student Success in Communication Skills Learning Scenarios with Virtual Humans., , , and . LAK, page 436-440. ACM, (2019)