Author of the publication

Perfomance analysis of the Fridrich-Goljan self-embedding authentication method.

, , and . ICIP, page 1253-1256. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Novel techniques for watermark extraction in the DCT domain., , and . NSIP, page 331-335. Bogaziçi University Printhouse, (1999)Ensuring gain-invariance in high-rate data hiding., , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 206-217. SPIE, (2005)Exploiting Security Holes in Lattice Data Hiding., and . Information Hiding, volume 4567 of Lecture Notes in Computer Science, page 159-173. Springer, (2007)Shedding More Light on Image Watermarks., and . Information Hiding, volume 1525 of Lecture Notes in Computer Science, page 191-207. Springer, (1998)Efficient reinitialization of the prewhitened constant modulus algorithm., and . IEEE Communications Letters, 5 (12): 488-490 (2001)Approaching the capacity limit in image watermarking: a perspective on coding techniques for data hiding applications, , and . Signal Processing, 81 (6): 1215--1238 (June 2001)New schemes and theoretical analysis of the master-slave family of recursive identification algorithms, and . Signal Processing, 58 (1): 79--94 (April 1997)Fingerprinting a flow of messages to an anonymous server., and . WIFS, page 97-102. IEEE, (2012)Coping with the enemy: Advances in adversary-aware signal processing., and . ICASSP, page 8682-8686. IEEE, (2013)CryptoDSPs for Cloud Privacy., and . WISE Workshops, volume 6724 of Lecture Notes in Computer Science, page 428-439. Springer, (2010)