Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Processing encrypted signals: a new frontier for multimedia security.. MM&Sec, page 1. ACM, (2006)Parallel Implementation of GC-Based MPC Protocols in the Semi-Honest Setting., , , , and . DPM/SETOP, volume 8247 of Lecture Notes in Computer Science, page 66-82. Springer, (2013)Image segmentation and region filling for virtual restoration of artworks., , , and . ICIP (1), page 562-565. IEEE, (2001)Discrete cosine transform of encrypted images., , and . ICIP, page 1668-1671. IEEE, (2008)A video forensic technique for detecting frame deletion and insertion., , , , and . ICASSP, page 6226-6230. IEEE, (2014)A data hiding approach for correcting errors in H.263 video transmitted over a noisy channel., , , and . MMSP, page 65-70. IEEE, (2001)Quality evaluation of motion estimation algorithms based on structural distortions., , and . MMSP, page 1-6. IEEE, (2009)Detection of double AVC/HEVC encoding., and . EUSIPCO, page 2245-2249. IEEE, (2016)Image counter-forensics based on feature injection., , , , , and . Media Watermarking, Security, and Forensics, volume 9028 of SPIE Proceedings, page 902810. SPIE, (2014)Optimum decoding and detection of a multiplicative amplitude-encoded watermark., , , and . Security and Watermarking of Multimedia Contents, volume 4675 of SPIE Proceedings, page 409-420. SPIE, (2002)