Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image counter-forensics based on feature injection., , , , , and . Media Watermarking, Security, and Forensics, volume 9028 of SPIE Proceedings, page 902810. SPIE, (2014)Exploring image dependencies: a new challenge in image forensics., , , , and . Media Forensics and Security, volume 7541 of SPIE Proceedings, page 75410X. SPIE, (2010)Detection of double AVC/HEVC encoding., and . EUSIPCO, page 2245-2249. IEEE, (2016)Optimum decoding and detection of a multiplicative amplitude-encoded watermark., , , and . Security and Watermarking of Multimedia Contents, volume 4675 of SPIE Proceedings, page 409-420. SPIE, (2002)Advantages and drawbacks of multiplicative spread spectrum watermarking., , and . Security and Watermarking of Multimedia Contents, volume 5020 of SPIE Proceedings, page 290-299. SPIE, (2003)Shedding light on some possible remedies against watermark desynchronization: a case study.. Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 106-113. SPIE, (2005)Object watermarking for for MPEG-4 video streams copyright protection., , , and . Security and Watermarking of Multimedia Contents, volume 3971 of SPIE Proceedings, page 465-476. SPIE, (2000)Parallel Implementation of GC-Based MPC Protocols in the Semi-Honest Setting., , , , and . DPM/SETOP, volume 8247 of Lecture Notes in Computer Science, page 66-82. Springer, (2013)Discrete cosine transform of encrypted images., , and . ICIP, page 1668-1671. IEEE, (2008)Image segmentation and region filling for virtual restoration of artworks., , , and . ICIP (1), page 562-565. IEEE, (2001)