Author of the publication

Holographic ImageWatermarking for Secure Content..

, , , and . TrustBus, volume 3184 of Lecture Notes in Computer Science, page 219-231. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Watermarking Technique of Controlling the Data-hiding Capacity., , , and . SIP, page 61-65. IASTED/ACTA Press, (2003)Holographic ImageWatermarking for Secure Content.., , , and . TrustBus, volume 3184 of Lecture Notes in Computer Science, page 219-231. Springer, (2004)Development of Visible Anti-copy Patterns., , , and . TrustBus, volume 3184 of Lecture Notes in Computer Science, page 209-218. Springer, (2004)Accurate Free Energy Estimations of Molecular Systems Via Flow-based Targeted Free Energy Perturbation., , and . CoRR, (2023)Feedback Control and 3D Motion of Heterogeneous Janus Particles., , , , , , and . ICRA, page 1352-1357. IEEE, (2019)13.2 A 32Gb 8.0Gb/s/pin DDR5 SDRAM with a Symmetric-Mosaic Architecture in a 5th-Generation 10nm DRAM Process., , , , , , , , , and 27 other author(s). ISSCC, page 234-236. IEEE, (2024)The Fingerprinting Algorithm for Digital Image and Video., , , and . Security and Management, page 595-600. CSREA Press, (2003)Assessment of the GNSS-RTK for Application in Precision Forest Operations., , , and . Remote. Sens., 16 (1): 148 (January 2024)A Study on Image Electronic Money Based on Watermarking Technique., , , , and . PCM (3), volume 3333 of Lecture Notes in Computer Science, page 508-514. Springer, (2004)Multi-Bits Image Watermarking Technique Against Geometrical Attacks., , and . Security and Management, page 112-117. CSREA Press, (2003)