From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Verification of hidden speaker behind transformation disguised voices., , и . Digit. Signal Process., (2015)A high capacity distortion-free data hiding algorithm for palette image., , , , и . ISCAS (2), стр. 916-919. IEEE, (2003)Analysis of the role played by error correcting coding in robust watermarking., , и . ISCAS (3), стр. 798-801. IEEE, (2003)New JPEG Steganographic Scheme with High Security Performance., , и . IWDW, том 6526 из Lecture Notes in Computer Science, стр. 189-201. Springer, (2010)Power constrained multiple signaling in digital image watermarking., , и . MMSP, стр. 388-393. IEEE, (1998)Robust Watermarking with Adaptive Receiving., , , и . IWDW, том 2939 из Lecture Notes in Computer Science, стр. 396-407. Springer, (2003)Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis., , , и . IWDW, том 3710 из Lecture Notes in Computer Science, стр. 139-146. Springer, (2005)Audio watermarking robust to geometrical distortions based on dyadic wavelet transform., , и . Security, Steganography, and Watermarking of Multimedia Contents, том 6505 из SPIE Proceedings, стр. 65050A. SPIE, (2007)CDMA-based watermarking resisting to cropping., , и . ISCAS (2), стр. 25-28. IEEE, (2004)Enhancing ROC performance of trustworthy camera source identification., , , и . Media Forensics and Security, том 7880 из SPIE Proceedings, стр. 788009. SPIE, (2011)