Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital image self-recovery using unequal error protection., , and . EUSIPCO, page 71-75. IEEE, (2015)Distribution independent blind watermarking., , and . ICIP, page 125-128. IEEE, (2009)Brand Visibility in Packaging: A Deep Learning Approach for Logo Detection, Saliency-Map Prediction, and Logo Placement Analysis., , , , , , and . CoRR, (2024)Optimum decoder for an additive video watermarking with Laplacian noise in H.264., , and . ISCISC, page 1-5. IEEE, (2013)Improvement on Bitcoin's Verifiable Public Randomness with Semi-Trusted Delegates., , , and . IST, page 53-57. IEEE, (2018)Application Detection in Anonymous Communication Networks., and . CECC, page 12:1-12:5. ACM, (2018)An invertible quantization based watermarking approach., , and . ICASSP, page 1677-1680. IEEE, (2008)Timing mismatch compensation in TI-ADCS using Bayesian approach., , and . EUSIPCO, page 1391-1395. IEEE, (2015)Joint Compensation of Jitter Noise and Time-Shift Errors in Multichannel Sampling System., , and . IEEE Trans. Instrumentation and Measurement, 68 (10): 3932-3941 (2019)Improved ensemble growing method for steganalysis of digital media., , and . Multimedia Tools Appl., 78 (8): 9877-9893 (2019)