Author of the publication

Steganalysis of spread spectrum data hiding exploiting cover memory.

, , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 38-46. SPIE, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Analysis of Window-based Flow Control Using TCP/IP: Effect of High Bandwidth-Delay Products and Random Loss., and . HPN, volume C-26 of IFIP Transactions, page 135-149. North-Holland, (1994)Distributed massive MIMO: Algorithms, architectures and concept systems., , , and . ITA, page 1-7. IEEE, (2014)Receiver-coordinated distributed transmit nullforming with channel state uncertainty., , , and . CISS, page 1-6. IEEE, (2012)Reaching out with wireless.. ACWR, page 33. ACM, (2011)Inferring user interests from tweet times., , and . COSN, page 235-240. ACM, (2013)Space-time localization using times of arrival., and . Allerton, page 1544-1551. IEEE, (2011)Blind phase/frequency synchronization with low-precision ADC: A Bayesian approach., and . Allerton, page 181-188. IEEE, (2013)Compressive tracking with 1000-element arrays: A framework for multi-Gbps mm wave cellular downlinks., , and . Allerton Conference, page 690-697. IEEE, (2012)Window-Based Error Recovery and Flow Control with a Slow Acknowledgement Channel: A Study of TCP/IP Performance., , and . INFOCOM, page 1199-1209. IEEE Computer Society, (1997)Distributed Coordination with Deaf Neighbors: Efficient Medium Access for 60 GHz Mesh Networks., , and . INFOCOM, page 1765-1773. IEEE, (2010)