Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hexagonal quantizers are not optimal for 2D data hiding., and . Security and Watermarking of Multimedia Contents, volume 5020 of SPIE Proceedings, page 623-631. SPIE, (2003)On distortion measures associated to random desynchronization attacks., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 65050D. SPIE, (2007)Report on Dirty Paper Coding Estimation with multidimensional lattices., and . CoRR, (2016)Design of projection matrices for PRNU compression., , , and . WIFS, page 1-6. IEEE, (2017)Putting the PRNU Model in Reverse Gear: Findings with Synthetic Signals., and . EUSIPCO, page 1352-1356. IEEE, (2018)On the co-existence of primary and secondary transmitters in a broadcast network., , and . CogART, page 27. ACM, (2011)On the role of differentiation for resampling detection., , and . ICIP, page 1753-1756. IEEE, (2010)Quantized projection data hiding., and . ICIP (2), page 889-892. IEEE, (2002)Dither-modulation data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks., , and . ICIP (2), page 503-506. IEEE, (2003)Optimal strategies for spread-spectrum and quantized-projection image data hiding games with BER payoffs., , and . ICIP (2), page 479-482. IEEE, (2003)