Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fingerprinting with Wow., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60720M. SPIE, (2006)BLINK: Securing Information to the Last Connection., , , , and . CCNC, page 1-2. IEEE, (2009)Reading Between the Lines: Lessons from the SDMI Challenge., , , , , , , and . USENIX Security Symposium, USENIX, (2001)On Public-Key Steganography in the Presence of an Active Warden.. Information Hiding, volume 1525 of Lecture Notes in Computer Science, page 355-368. Springer, (1998)Reverse-Engineering a Watermark Detector Using an Oracle., , and . EURASIP J. Information Security, (2007)An Implementation of, and Attacks on, Zero-Knowledge Watermarking., , and . Information Hiding, volume 3200 of Lecture Notes in Computer Science, page 1-12. Springer, (2004)Reverse-engineering a detector with false alarms., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 65050C. SPIE, (2007)The non-trusty clown attack on model-based speaker recognition systems., and . Media Watermarking, Security, and Forensics, volume 9409 of SPIE Proceedings, page 940904. SPIE, (2015)Subset selection circumvents the square root law., and . Media Forensics and Security, volume 7541 of SPIE Proceedings, page 754103. SPIE, (2010)Applying a Zero-Knowledge Watermarking Protocol to Secure Elections., and . IH&MMSec, page 115-120. ACM, (2023)