Author of the publication

DCT-OFDM Based Watermarking Scheme Robust Against Clipping, Rotation, and Scaling Attacks.

, , , and . IWDW, volume 9569 of Lecture Notes in Computer Science, page 271-284. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Near-Optimal Detection for Binary Tardos Code by Estimating Collusion Strategy., , , and . IEEE Trans. Inf. Forensics Secur., (2020)A framework for generalized group testing with inhibitors and its potential application in neuroscience., , , and . CoRR, (2018)Efficiently Decodable Non-Adaptive Threshold Group Testing., , , and . CoRR, (2017)A Throughput Fairness Control Method for Concurrent Communications in Wireless Local-Area Network with Multiple Access-Points., , , , , and . J. Commun., 17 (8): 592-599 (2022)DeepFake Detection for Human Face Images and Videos: A Survey., , , and . IEEE Access, (2022)On the systematic generation of Tardos's fingerprinting codes., , and . MMSP, page 748-753. IEEE Signal Processing Society, (2008)Experimental Assessment of Probabilistic Fingerprinting Codes over AWGN Channel.. IWSEC, volume 6434 of Lecture Notes in Computer Science, page 117-132. Springer, (2010)Enrichment of Visual Appearance of Aesthetic QR Code., and . IWDW, volume 9569 of Lecture Notes in Computer Science, page 220-231. Springer, (2015)A Watermarking Scheme Applicable for Fingerprinting Protocol., and . IWDW, volume 2939 of Lecture Notes in Computer Science, page 532-543. Springer, (2003)Reversible Watermark with Large Capacity Based on the Prediction Error Expansion., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 91-A (7): 1780-1790 (2008)