From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Possible counter-attacks against random geometric distortions., и . Security and Watermarking of Multimedia Contents, том 3971 из SPIE Proceedings, стр. 338-345. SPIE, (2000)Replacement Attack on Arbitrary Watermarking Systems., и . Digital Rights Management Workshop, том 2696 из Lecture Notes in Computer Science, стр. 177-189. Springer, (2002)The blind pattern matching attack on watermark systems., и . ICASSP, стр. 3740-3743. IEEE, (2002)Explainable Machine Learning for Fraud Detection., , , , , и . CoRR, (2021)Blind pattern matching attack on watermarking systems., и . IEEE Trans. Signal Process., 51 (4): 1045-1053 (2003)Digital Watermarking.. Digital Rights Management, том 2770 из Lecture Notes in Computer Science, Springer, (2003)Attacks on Copyright Marking Systems., , и . Information Hiding, том 1525 из Lecture Notes in Computer Science, стр. 218-238. Springer, (1998)Privacy-Enhancing Context Authentication from Location-Sensitive Data., , и . ARES, стр. 87:1-87:10. ACM, (2019)Decentralizing Digital Identity: Open Challenges for Distributed Ledgers., , и . EuroS&P Workshops, стр. 75-78. IEEE, (2018)Defining security in steganographic systems., и . Security and Watermarking of Multimedia Contents, том 4675 из SPIE Proceedings, стр. 50-56. SPIE, (2002)