From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fingerprinting with Wow., и . Security, Steganography, and Watermarking of Multimedia Contents, том 6072 из SPIE Proceedings, стр. 60720M. SPIE, (2006)BLINK: Securing Information to the Last Connection., , , , и . CCNC, стр. 1-2. IEEE, (2009)Reading Between the Lines: Lessons from the SDMI Challenge., , , , , , , и . USENIX Security Symposium, USENIX, (2001)An Implementation of, and Attacks on, Zero-Knowledge Watermarking., , и . Information Hiding, том 3200 из Lecture Notes in Computer Science, стр. 1-12. Springer, (2004)Reverse-engineering a detector with false alarms., и . Security, Steganography, and Watermarking of Multimedia Contents, том 6505 из SPIE Proceedings, стр. 65050C. SPIE, (2007)On Public-Key Steganography in the Presence of an Active Warden.. Information Hiding, том 1525 из Lecture Notes in Computer Science, стр. 355-368. Springer, (1998)The non-trusty clown attack on model-based speaker recognition systems., и . Media Watermarking, Security, and Forensics, том 9409 из SPIE Proceedings, стр. 940904. SPIE, (2015)Subset selection circumvents the square root law., и . Media Forensics and Security, том 7541 из SPIE Proceedings, стр. 754103. SPIE, (2010)Applying a Zero-Knowledge Watermarking Protocol to Secure Elections., и . IH&MMSec, стр. 115-120. ACM, (2023)Nondestructive ciphertext injection in document files., и . Media Watermarking, Security, and Forensics, Society for Imaging Science and Technology, (2019)