Author of the publication

Watermarking Digital Images in the Frequency Domain: Performance and Attack Issues.

, , and . WEBIST (Selected Papers), volume 189 of Lecture Notes in Business Information Processing, page 68-84. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Watermarking Images using 2D Representations of Self-inverting Permutations., , and . WEBIST, page 380-385. SciTePress, (2012)Watermarking Images in the Frequency Domain by Exploiting Self-inverting Permutations., , and . WEBIST, page 45-54. SciTePress, (2013)Efficient Encoding of Watermark Numbers as Reducible Permutation Graphs, and . CoRR, (2011)Encoding watermark numbers as reducible permutation graphs using self-inverting permutations., , and . Discret. Appl. Math., (2018)A Dynamic Watermarking Model for Embedding Reducible Permutation Graphs into Software., , and . SECRYPT, page 74-85. SciTePress, (2013)A Code-Based Multiple Watermarking Scheme for the Preservation of Authenticity of Forensic Images., , , and . IISA, page 1-8. IEEE, (2023)Tamper Detection and Localization in Forensic Images., , , , and . CompSysTech, page 117-122. ACM, (2023)Design and Evaluation of a Graph Codec System for Software Watermarking., and . DATA, page 277-284. SciTePress, (2013)Encoding Watermark Numbers as Reducible Permutation Graphs using Self-inverting Permutations., , and . CoRR, (2017)Encoding numbers into reducible permutation graphs using heap-ordered trees., and . Panhellenic Conference on Informatics, page 311-316. ACM, (2015)