Author of the publication

On the use of masking models for image and audio watermarking.

, and . IEEE Trans. Multim., 7 (4): 727-739 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Public key watermarking issue., and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 290-299. SPIE, (2001)Report on the TREC-8 Experiment: Searching on the Web and in Distributed Collections., and . TREC, volume 500-246 of NIST Special Publication, National Institute of Standards and Technology (NIST), (1999)Finding content-bearing terms using term similarities.. EACL, page 241-244. The Association for Computer Linguistics, (1999)20 years of physical document and product protection using digital methods.. DocEng, page 13:1. ACM, (2021)Masking models and watermark undetection., and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 455-467. SPIE, (2001)Modeling and Combining Evidence Provided by Document Relationships Using Probabilistic Argumentation Systems.. SIGIR, page 182-189. ACM, (1998)Neural Networks Functions for Public Key Watermarking., and . Information Hiding, volume 2137 of Lecture Notes in Computer Science, page 142-156. Springer, (2001)Can Copy Detection Patterns be copied? Evaluating the performance of attacks and highlighting the role of the detector., , and . WIFS, page 1-6. IEEE, (2021)Counterfeit detection with QR codes., , and . DocEng, page 16:1-16:4. ACM, (2021)Optimizing watermark robustness with respect to a perceptual distortion constraint., and . Security and Watermarking of Multimedia Contents, volume 5020 of SPIE Proceedings, page 115-122. SPIE, (2003)