Author of the publication

Watermarking Technique of Controlling the Data-hiding Capacity.

, , , and . SIP, page 61-65. IASTED/ACTA Press, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Multi-Layer Copyright Protection by Using Digital Watermarking., , and . Security and Management, page 626-632. CSREA Press, (2003)Multi-bits Fingerprinting for Image., , , and . SIP, page 152-155. IASTED/ACTA Press, (2003)Holographic ImageWatermarking for Secure Content.., , , and . TrustBus, volume 3184 of Lecture Notes in Computer Science, page 219-231. Springer, (2004)Development of Visible Anti-copy Patterns., , , and . TrustBus, volume 3184 of Lecture Notes in Computer Science, page 209-218. Springer, (2004)Watermarking for 3D NURBS graphic data., , and . IEEE Workshop on Multimedia Signal Processing, page 304-307. IEEE, (2002)Watermarking Technique of Controlling the Data-hiding Capacity., , , and . SIP, page 61-65. IASTED/ACTA Press, (2003)Multi-Bits Image Watermarking Technique Against Geometrical Attacks., , and . Security and Management, page 112-117. CSREA Press, (2003)Broadcast Synchronizing System Using Audio Watermark., , and . PCM (2), volume 3768 of Lecture Notes in Computer Science, page 153-163. Springer, (2005)Technologies for Online Issuing Service of Documents., , and . WISE, volume 3306 of Lecture Notes in Computer Science, page 169-180. Springer, (2004)Are the factors affecting the quality of IS projects identical in large corporations and manufacturing SMEs?, , and . ICIS, page 205-209. IEEE, (2011)