Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Security Holes in Lattice Data Hiding., and . Information Hiding, volume 4567 of Lecture Notes in Computer Science, page 159-173. Springer, (2007)Gradiant asymmetric encryption and verification systems based on handwritten signature., , and . ACM Conference on Computer and Communications Security, page 1349-1350. ACM, (2013)Secret dither estimation in lattice-quantization data hiding: a set membership approach., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60720W. SPIE, (2006)Worst case attacks against binary probabilistic traitor tracing codes., and . WIFS, page 56-60. IEEE, (2009)Security of Lattice-Based Data Hiding Against the Known Message Attack., , , and . IEEE Trans. Inf. Forensics Secur., 1 (4): 421-439 (2006)On achievable security levels for lattice data hiding in the known message attack scenario., , and . MM&Sec, page 68-79. ACM, (2006)The blind Newton sensitivity attack., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60720E. SPIE, (2006)EM decoding of tardos traitor tracing codes., and . MM&Sec, page 99-106. ACM, (2009)Security of spread-spectrum-based data hiding., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 65050F. SPIE, (2007)Spread-spectrum vs. quantization-based data hiding: misconceptions and implications., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 341-352. SPIE, (2005)