Author of the publication

Robust Digital Watermarking Based on Key-Dependent Basis Functions.

, , and . Information Hiding, volume 1525 of Lecture Notes in Computer Science, page 143-157. Springer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Images with Self-Correcting Capabilities., and . ICIP (3), page 792-796. IEEE, (1999)A hybrid watermark for tamper detection in digital images.. ISSPA, page 301-304. IEEE, (1999)Lossless authentication of MPEG-2 video., and . ICIP (2), page 893-896. IEEE, (2002)Secure Steganographic Methods for Palette Images., and . Information Hiding, volume 1768 of Lecture Notes in Computer Science, page 47-60. Springer, (1999)A Projection Inequality., , and . SIAM Rev., 38 (2): 315 (1996)Staganalysis of LSB Encoding in Color Images., , and . IEEE International Conference on Multimedia and Expo (III), page 1279-1282. IEEE Computer Society, (2000)Applications of data hiding in digital images.. ISSPA, page 9. IEEE, (1999)Image Watermarking for Tamper Detection.. ICIP (2), page 404-408. IEEE Computer Society, (1998)Robust Bit Extraction from Images.. ICMCS, Vol. 2, page 536-540. IEEE Computer Society, (1999)0-7695-0253-9.Robust Hash Functions for Digital Watermarking.. ITCC, page 178-183. IEEE Computer Society, (2000)