From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Watermark copy attack., , и . Security and Watermarking of Multimedia Contents, том 3971 из SPIE Proceedings, стр. 371-381. SPIE, (2000)Secure Copyright Protection Techniques for Digital Images., , , , и . Information Hiding, том 1525 из Lecture Notes in Computer Science, стр. 169-190. Springer, (1998)Generalized watermarking attack based on watermark estimation and perceptual remodulation., , , , и . Security and Watermarking of Multimedia Contents, том 3971 из SPIE Proceedings, стр. 358-370. SPIE, (2000)Copyright Protection for Multimedia-Data based on Asymmetric Cryptographic Techniques.. Electronic Imaging, том 3409 из SPIE Proceedings, стр. 164-175. SPIE, (1998)Macrocell-level compaction with automatic jog introduction., , и . ICCD, стр. 536-539. IEEE, (1989)Counterfeit Attacks against a new Currency Protection Scheme., и . Communications and Multimedia Security, том 192 из IFIP Conference Proceedings, Kluwer, (2001)Watermarking scheme for large images using parallel processing., , , и . Security and Watermarking of Multimedia Contents, том 4314 из SPIE Proceedings, стр. 26-34. SPIE, (2001)A global floorplanning technique for VLSI layout., , и . ICCD, стр. 92-95. IEEE, (1989)Watermark template attack., , и . Security and Watermarking of Multimedia Contents, том 4314 из SPIE Proceedings, стр. 394-405. SPIE, (2001)StegoWall: blind statistical detection of hidden data., , , и . Security and Watermarking of Multimedia Contents, том 4675 из SPIE Proceedings, стр. 57-68. SPIE, (2002)