Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reversible image watermarking., , and . ICIP (2), page 731-734. IEEE, (2003)"3D Face": Biometric Template Protection for 3D Face Recognition., , , , and . ICB, volume 4642 of Lecture Notes in Computer Science, page 566-573. Springer, (2007)Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks., , , and . IEEE Trans. Inf. Forensics Secur., 3 (3): 475-487 (2008)Electronic content delivery and forensic watermarking., , and . Multim. Syst., 11 (2): 174-184 (2005)Audio watermarking for monitoring and copy protection., , , and . ACM Multimedia Workshops, page 119-122. ACM Press, (2000)Morphological synthesis of ECG signals for person authentication., , , , and . EUSIPCO, page 738-742. IEEE, (2007)Forensic Watermarking in Digital Rights Management., , , and . Security, Privacy, and Trust in Modern Data Management, Springer, (2007)Secure Embedding of Spread Spectrum Watermarks using Look-up-Tables., , , and . ICASSP (2), page 153-156. IEEE, (2007)A Buyer-Seller Watermarking Protocol Based on Secure Embedding., , , , and . IEEE Trans. Inf. Forensics Secur., 3 (4): 783-786 (2008)Privacy enhancing technology for a 3D-face recognition system., , , , , and . BIOSIG, volume P-108 of LNI, page 3-14. GI, (2007)