Author of the publication

MPsteg: hiding a message in the Matching Pursuit domain.

, , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60720P. SPIE, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of the security of linear blinding techniques from an information theoretical point of view., , and . ICASSP, page 5852-5855. IEEE, (2011)Steganography in Digital Media: Principles, Algorithms, and Applications (Fridrich, J. 2010) Book Reviews.. IEEE Signal Process. Mag., 28 (5): 142-144 (2011)A structural method for quality evaluation of desynchronization attacks in image watermarking., and . MMSP, page 754-759. IEEE Signal Processing Society, (2008)Rational dither modulation: a novel data-hiding method robust to value-metric scaling attacks., , , and . MMSP, page 139-142. IEEE, (2004)Dealing with uncertainty in image forensics: A fuzzy approach., and . ICASSP, page 1753-1756. IEEE, (2012)Compressive hyperspectral imaging using progressive total variation., , , , and . ICASSP, page 7794-7798. IEEE, (2014)Adversarial Source Identification Game With Corrupted Training., and . IEEE Trans. Inf. Theory, 64 (5): 3894-3915 (2018)Performance analysis of ST-DM watermarking in presence of nonadditive attacks., , and . IEEE Trans. Signal Process., 52 (10): 2965-2974 (2004)Optimum decoding and detection of multiplicative watermarks., , , and . IEEE Trans. Signal Process., 51 (4): 1118-1123 (2003)Editorial., , and . EURASIP J. Adv. Signal Process., 2002 (2): 123-125 (2002)