Author of the publication

A novel interpretation of content authentication.

, , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 65050I. SPIE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Introduction to the Principles and Requirements of Robust Hashing.. Intelligent Multimedia Analysis for Security Applications, volume 282 of Studies in Computational Intelligence, Springer, (2010)Performance Analysis of Robust Audio Hashing., , , and . IEEE Trans. Inf. Forensics Secur., 2 (2): 254-266 (2007)Provably or probably robust data hiding?, and . ICME (2), page 481-484. IEEE Computer Society, (2002)0-7803-7304-9.Performance of DNA data embedding algorithms under substitution mutations., and . BIBM Workshops, page 201-206. IEEE, (2010)A novel interpretation of content authentication., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 65050I. SPIE, (2007)Optimum Exact Histogram Specification.. ICASSP, page 1413-1417. IEEE, (2018)Optimum reversible data hiding and permutation coding.. WIFS, page 1-4. IEEE, (2015)A model for improving the performance of feature-extraction-based robust hashing., , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 59-67. SPIE, (2005)Iterative estimation of amplitude scaling on distortion-compensated dither modulation., , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 549-560. SPIE, (2005)A framework for soft hashing and its application to robust image hashing., , , and . ICIP, page 397-400. IEEE, (2004)