Author of the publication

Application of invisible image watermarks to produce remotely printed, duplication-resistant, and demonstrably authentic documents.

, , , , and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 351-359. SPIE, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The mathematics of halftoning., , , , and . IBM J. Res. Dev., 47 (1): 5-16 (2003)Fragile imperceptible digital watermark with privacy control., , , , and . Security and Watermarking of Multimedia Contents, volume 3657 of SPIE Proceedings, page 79-84. SPIE, (1999)Error bounds for error diffusion and other mathematical problems arising in digital halftoning., , , , , and . Color Imaging: Device-Independent Color, Color Hardcopy, and Graphic Arts, volume 3963 of SPIE Proceedings, page 437-445. SPIE, (2000)A walk along the branches of the extended Farey Tree., and . IBM J. Res. Dev., 39 (3): 283-294 (1995)The optimality of the online greedy algorithm in carpool and chairman assignment problems., , , , and . ACM Trans. Algorithms, 7 (3): 37:1-37:22 (2011)Diffeomorphisms with infinitely many strange attractors., and . J. Complex., 6 (4): 409-416 (1990)Error bounds for error diffusion and related digital halftoning algorithms., , , , , and . ISCAS (2), page 513-516. IEEE, (2001)Application of invisible image watermarks to produce remotely printed, duplication-resistant, and demonstrably authentic documents., , , , and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 351-359. SPIE, (2001)