Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Boosting Steganalysis with Explicit Feature Maps., and . IH&MMSec, page 149-157. ACM, (2016)Improving Steganographic Security by Synchronizing the Selection Channel., and . IH&MMSec, page 5-14. ACM, (2015)Introduction to the ACM multimedia and security workshop., and . MM&Sec, page 1-3. ACM, (2004)On completeness of feature spaces in blind steganalysis., and . MM&Sec, page 123-132. ACM, (2008)Efficient Wet Paper Codes., , and . Information Hiding, volume 3727 of Lecture Notes in Computer Science, page 204-218. Springer, (2005)Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes.. Information Hiding, volume 3200 of Lecture Notes in Computer Science, page 67-81. Springer, (2004)Minimizing additive distortion functions with non-binary embedding operation in steganography., and . WIFS, page 1-6. IEEE, (2010)Multivariate gaussian model for designing additive distortion for steganography., and . ICASSP, page 2949-2953. IEEE, (2013)Camera identification from cropped and scaled images., and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 68190E. SPIE, (2008)New methodology for breaking steganographic techniques for JPEGs., , and . Security and Watermarking of Multimedia Contents, volume 5020 of SPIE Proceedings, page 143-155. SPIE, (2003)