Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of PC-Based Real-Time Watermark Embedding System for Standard-Definition Video Stream., , , and . New Directions in Intelligent Interactive Multimedia, volume 142 of Studies in Computational Intelligence, Springer, (2008)Print traceability systems framework using digital watermarks for binary images., , , , and . SMC (4), page 3285-3290. IEEE, (2004)Use of inferential statistics to estimate error probability of video watermarks., , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 391-399. SPIE, (2005)Mix-ORAM: Using delegate shuffles., , and . CoRR, (2017)Preventing unauthorized copying of displayed information by utilizing differences in spectral sensitivity between humans and imaging devices., , and . WIFS, page 145-150. IEEE, (2012)How to Deal with Blurriness in Live Forensics: A Case of Study., , and . NCM, page 1865-1871. IEEE Computer Society, (2009)Audiovisual Speaker Conversion: Jointly and Simultaneously Transforming Facial Expression and Acoustic Characteristics., , , and . ICASSP, page 6795-6799. IEEE, (2019)Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment., , , and . SEC, volume 455 of IFIP Advances in Information and Communication Technology, page 479-494. Springer, (2015)Transformation on Computer-Generated Facial Image to Avoid Detection by Spoofing Detector., , , , and . ICME, page 1-6. IEEE Computer Society, (2018)Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm., , , and . CANDAR, page 457-462. IEEE Computer Society, (2015)