Author of the publication

A wavelet watermarking algorithm based on a tree structure.

, , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 571-580. SPIE, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Temporal synchronization in video watermarking., and . Security and Watermarking of Multimedia Contents, volume 4675 of SPIE Proceedings, page 478-490. SPIE, (2002)Temporal synchronization in video watermarking: further studies., and . Security and Watermarking of Multimedia Contents, volume 5020 of SPIE Proceedings, page 493-504. SPIE, (2003)Evaluation of watermarking low-bit-rate MPEG-4 bit streams., , and . Security and Watermarking of Multimedia Contents, volume 5020 of SPIE Proceedings, page 440-451. SPIE, (2003)Spatial synchronization using watermark key structure., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 536-547. SPIE, (2004)A Review of Data Hiding in Digital Images., and . PICS, page 274-278. IS&T - The Society for Imaging Science and Technology, (1999)Detection of image alterations using semifragile watermarks., , and . Security and Watermarking of Multimedia Contents, volume 3971 of SPIE Proceedings, page 152-163. SPIE, (2000)Streaming video and rate-scalable compression: What are the challenges for watermarking?, , , and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 116-127. SPIE, (2001)A hierarchical protocol for increasing the stealthiness of steganographic methods., , , , , and . MM&Sec, page 16-24. ACM, (2004)Streaming video and rate scalable compression: what are the challenges for watermarking?, , , and . J. Electronic Imaging, 13 (1): 198-208 (2004)An Overview of Security Issues in Streaming Video., , , and . ITCC, page 345-348. IEEE Computer Society, (2001)