Author of the publication

Secret dither estimation in lattice-quantization data hiding: a set membership approach.

, , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60720W. SPIE, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis., , and . Information Hiding, volume 3727 of Lecture Notes in Computer Science, page 146-160. Springer, (2005)Blind iterative decoding of side-informed data hiding using the expectation-maximization algorithm., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 805-815. SPIE, (2004)Quantifying security leaks in spread spectrum data hiding: a game-theoretic approach., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 592-601. SPIE, (2004)Applying Erez and Ten Brink's dirty paper codes to data hiding., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 298-307. SPIE, (2005)Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains.. WIFS, page 211-216. IEEE, (2012)Detection of video double encoding with GOP size estimation., , , , , and . WIFS, page 151-156. IEEE, (2012)On distortion-compensated dither modulation data-hiding with repetition coding., , and . IEEE Trans. Signal Process., 54 (2): 585-600 (2006)ML estimation of the resampling factor., and . WIFS, page 205-210. IEEE, (2012)Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks., , and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 681909. SPIE, (2008)Secret dither estimation in lattice-quantization data hiding: a set membership approach., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60720W. SPIE, (2006)