Author of the publication

A novel interpretation of content authentication.

, , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 65050I. SPIE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The robust SPR problem: Design algorithms and new applications, , and . Signal Processing, 76 (3): 269--283 (August 1999)Efficient protocols for secure adaptive filtering., and . ICASSP, page 5860-5863. IEEE, (2011)Applying Erez and Ten Brink's dirty paper codes to data hiding., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 298-307. SPIE, (2005)Visible encryption: using paper as a secure channel., and . Security and Watermarking of Multimedia Contents, volume 5020 of SPIE Proceedings, page 413-422. SPIE, (2003)Spread-spectrum vs. quantization-based data hiding: misconceptions and implications., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 341-352. SPIE, (2005)Blind iterative decoding of side-informed data hiding using the expectation-maximization algorithm., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 805-815. SPIE, (2004)Quantifying security leaks in spread spectrum data hiding: a game-theoretic approach., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 592-601. SPIE, (2004)Security of spread-spectrum-based data hiding., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 65050F. SPIE, (2007)A Novel Model for the Print-and-Capture Channel in 2D Bar Codes., , and . MRCS, volume 4105 of Lecture Notes in Computer Science, page 627-634. Springer, (2006)Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis., , and . Information Hiding, volume 3727 of Lecture Notes in Computer Science, page 146-160. Springer, (2005)