Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Some remarks on the lattice form of the Steiglitz-McBride iteration., and . IEEE Signal Process. Lett., 6 (11): 290-292 (1999)Detection in quantization-based watermarking: performance and security issues., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 721-733. SPIE, (2005)Efficient non-interactive zero-knowledge watermark detector robust to sensitivity attacks., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 65050B. SPIE, (2007)Coding at the sample level for data hiding: turbo and concatenated codes., and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 532-543. SPIE, (2001)Model-based steganalysis using invariant features., , and . Media Forensics and Security, volume 7254 of SPIE Proceedings, page 72540B. SPIE, (2009)Road vehicle speed estimation from a two-microphone array., , and . ICASSP, page 1321-1324. IEEE, (2002)Filtered error adaptive IIR algorithms and their application to active noise control., , and . ICASSP, page 1701-1704. IEEE, (1998)Overlay spectrum reuse in a multicarrier broadcast network: Single receiver analysis., , and . SPAWC, page 209-213. IEEE, (2012)Fast sequential forensic camera identification., , , and . CoRR, (2015)The robust SPR problem: Design algorithms and new applications., , and . Signal Process., 76 (3): 269-283 (1999)