Author of the publication

Empirical evaluation of a JPEG2000 standard-based robust watermarking scheme.

, , and . Security and Watermarking of Multimedia Contents, volume 5020 of SPIE Proceedings, page 717-727. SPIE, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data hiding: New opportunities for security and privacy?. EICC, page 15:1-15:6. ACM, (2020)DISSIMILAR: Towards fake news detection using information hiding, signal processing and machine learning., , , and . ARES, page 66:1-66:9. ACM, (2021)Subsequent embedding in image steganalysis: Theoretical framework and practical applications., and . CoRR, (2021)A systematic method to enhance the robustness of stabilising receding-horizon predictive controllers., , and . ECC, page 831-836. IEEE, (1999)Min-max constrained infinite horizon model predictive control: Standard vs. feedback formulation., , and . ECC, page 3765-3770. IEEE, (2001)A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression., , and . Communications and Multimedia Security, volume 2828 of Lecture Notes in Computer Science, page 226-238. Springer, (2003)DNA-inspired anonymous fingerprinting for efficient peer-to-peer content distribution., and . IEEE Congress on Evolutionary Computation, page 2376-2383. IEEE, (2013)Robust Frequency Domain Audio Watermarking: A Tuning Analysis., , and . IWDW, volume 3304 of Lecture Notes in Computer Science, page 244-258. Springer, (2004)Flexible image watermarking in JPEG domain., and . ISSPIT, page 311-316. IEEE, (2016)Influence of mark embedding strategies on lossless compression of ultraspectral images., , , , , and . IGARSS, page 4. IEEE, (2005)