Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Use of inferential statistics to estimate error probability of video watermarks., , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 391-399. SPIE, (2005)Mix-ORAM: Using delegate shuffles., , and . CoRR, (2017)Analysis of Facebook Friends Using Disclosure Level., , , and . IIH-MSP, page 471-474. IEEE, (2014)Surveillance Camera System to Achieve Privacy Protection and Crime Prevention., , , and . IIH-MSP, page 463-466. IEEE, (2014)Improved non-adaptive algorithms for threshold group testing with a gap., , and . ISIT, page 1414-1419. IEEE, (2020)Multi-task Learning for Detecting and Segmenting Manipulated Facial Images and Videos., , , and . BTAS, page 1-8. IEEE, (2019)Isolation in Cloud Computing and Privacy-Enhancing Technologies - Suitability of Privacy-Enhancing Technologies for Separating Data Usage in Business Processes., , and . Bus. Inf. Syst. Eng., 3 (3): 155-162 (2011)On Privacy-compliant Disclosure of Personal Data to Third Parties using Digital Watermarking., , , and . J. Inf. Hiding Multim. Signal Process., 2 (3): 270-281 (2011)Preventing unauthorized copying of displayed information by utilizing differences in spectral sensitivity between humans and imaging devices., , and . WIFS, page 145-150. IEEE, (2012)Use of invisible noise signals to prevent privacy invasion through face recognition from camera images., , and . ACM Multimedia, page 1315-1316. ACM, (2012)