Author of the publication

The Watermark Evaluation Testbed (WET): new functionalities.

, , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60721O. SPIE, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inspection of machine parts by backprojection reconstruction., , , and . ICRA, page 503-508. IEEE, (1987)Printer identification based on graylevel co-occurrence features for security and forensic applications.., , , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 430-440. SPIE, (2005)A hierarchical protocol for increasing the stealthiness of steganographic methods., , , , , and . MM&Sec, page 16-24. ACM, (2004)Stochastic Models of Video Structure for Program Genre Detection., , , and . VLBV, volume 2849 of Lecture Notes in Computer Science, page 84-92. Springer, (2003)Person re-identification using a patch-based appearance model., , and . ICIP, page 764-768. IEEE, (2016)Detection of unique people in news programs using multimodal shot clustering., , , and . ICIP, page 697-700. IEEE, (2004)An image normalization based watermarking scheme robust to general affine transformation., and . ICIP, page 1553-1556. IEEE, (2004)Channel-aware rate-distortion optimized leaky motion prediction., and . ICIP, page 2079-2082. IEEE, (2004)Complexity-Rate-Distortion Analysis of Backward Channel Aware Wyner-Ziv Video Coding., , and . ICIP (2), page 25-28. IEEE, (2007)Generating optimal look-up tables to achieve complex color space transformations., , , and . ICIP, page 1641-1644. IEEE, (2009)