Author of the publication

Filtered error adaptive IIR algorithms and their application to active noise control.

, , and . ICASSP, page 1701-1704. IEEE, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On distortion measures associated to random desynchronization attacks., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 65050D. SPIE, (2007)Hexagonal quantizers are not optimal for 2D data hiding., and . Security and Watermarking of Multimedia Contents, volume 5020 of SPIE Proceedings, page 623-631. SPIE, (2003)Report on Dirty Paper Coding Estimation with multidimensional lattices., and . CoRR, (2016)On achievable security levels for lattice data hiding in the known message attack scenario., , and . MM&Sec, page 68-79. ACM, (2006)Quantization-based watermarking performance improvement using host statistics: AWGN attack case., , , , and . MM&Sec, page 35-39. ACM, (2004)MPEG-2 Prediction Residue Analysis., and . CoRR, (2019)Rational dither modulation: a novel data-hiding method robust to value-metric scaling attacks., , , and . MMSP, page 139-142. IEEE, (2004)Meet the Family of Statistical Disclosure Attacks., , and . CoRR, (2019)Understanding the Effects of Real-World Behavior in Statistical Disclosure Attacks., , and . CoRR, (2019)Algebraic solution to the robust SPR problem for two polynomials., and . Autom., 37 (5): 757-762 (2001)