Author of the publication

Security Analysis of ISS Watermarking Using Natural Scene Statistics.

, , , , and . Information Hiding, volume 6387 of Lecture Notes in Computer Science, page 235-248. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Provably Secure Spread-Spectrum Watermarking Schemes in the Known Message Attack Framework., and . Information Hiding, volume 6387 of Lecture Notes in Computer Science, page 249-261. Springer, (2010)Enhancing ROC performance of trustworthy camera source identification., , , and . Media Forensics and Security, volume 7880 of SPIE Proceedings, page 788009. SPIE, (2011)Double H.264/AVC compression detection using quantized nonzero AC coefficients., , , , and . Media Forensics and Security, volume 7880 of SPIE Proceedings, page 78800Q. SPIE, (2011)Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images., and . IEEE Trans. Image Processing, 25 (3): 1312-1326 (2016)GSM Based Security Analysis for Add-SS Watermarking., , , and . IWDW, volume 5450 of Lecture Notes in Computer Science, page 313-326. Springer, (2008)Robust Audio Watermarking Based on Log-Polar Frequency Index., , and . IWDW, volume 5450 of Lecture Notes in Computer Science, page 124-138. Springer, (2008)A RST-Invariant Robust DWT-HMM Watermarking Algorithm Incorporating Zernike Moments and Template., , , and . KES (1), volume 3681 of Lecture Notes in Computer Science, page 1233-1239. Springer, (2005)Detecting double compressed AMR audio using deep learning., , and . ICASSP, page 2669-2673. IEEE, (2014)Verification of hidden speaker behind transformation disguised voices., , and . Digit. Signal Process., (2015)New JPEG Steganographic Scheme with High Security Performance., , and . IWDW, volume 6526 of Lecture Notes in Computer Science, page 189-201. Springer, (2010)