Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiple watermarking: a vector space projection approach., , and . Computational Imaging, volume 6065 of SPIE Proceedings, page 60650O. SPIE, (2006)Improved embedding efficiency and AWGN robustness for SS watermarks via pre-coding., , , and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 68191F. SPIE, (2008)Collusion Resilient Fingerprint Design by Alternating Projections., , , and . ICIP (4), page 437-440. IEEE, (2007)Informed watermark embedding in the fractional fourier domain., , and . EUSIPCO, page 1-4. IEEE, (2005)Steganalysis aware steganography: statistical indistinguishability despite high distortion., , , and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 681915. SPIE, (2008)An expressive and compact representation of musical sound., , , and . ICASSP (4), page 249-252. IEEE, (2004)Robust analog circuit design: a set theoretic approach., and . ISCAS, IEEE, (2006)Morphological Steganalysis of Audio Signals and the Principle of Diminishing Marginal Distortions., , , , , and . ICASSP (2), page 21-24. IEEE, (2005)Set Theoretic Quantization Index Modulation Watermarking., , and . ICASSP (2), page 229-232. IEEE, (2006)Optimum Watermark Design by Vector Space Projections., , and . ICIP, page 1413-1416. IEEE, (2006)