Author of the publication

Steganalysis of block-structured stegotext.

, and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 477-488. SPIE, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A low-rate fingerprinting code and its application to blind image fingerprinting., and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 681907. SPIE, (2008)Steganalysis of block-structured stegotext., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 477-488. SPIE, (2004)Low-complexity image denoising based on statistical modeling of wavelet coefficients., , , and . IEEE Signal Process. Lett., 6 (12): 300-303 (1999)Transform image coding based on joint adaptation of filer banks and tree structures, , and . IEEE Int'l Conf. Image Processing, Laussanne, Switzerland, (1996)33\% contribution. Oral presentation, N/A acceptance rate..Transform image coding based on joint adaptation of filer banks, tree structures and quantizers, , and . DCC, Salt Lake City, UT, (1997)Learning from Collective Intelligence in Groups, , , and . CoRR, (2012)Information-Hiding Games.. IWDW, volume 2613 of Lecture Notes in Computer Science, page 1-12. Springer, (2002)Theory of rate-distortion-optimal, constrained filterbanks-application to IIR and FIR biorthogonal designs., , and . IEEE Trans. Signal Process., 48 (4): 1120-1132 (2000)Meta-classifiers for multimodal document classification., , and . MMSP, page 1-6. IEEE, (2009)Two private, perceptual data-hiding games., and . ICASSP (3), page 373-376. IEEE, (2004)