Author of the publication

Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing.

, , , , , , and . EURASIP J. Information Security, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient buyer-seller watermarking protocol based on composite signal representation., , , and . MM&Sec, page 9-18. ACM, (2009)Near optimal detection of quantized signals and application to JPEG forensics., , and . WIFS, page 168-173. IEEE, (2013)Watermark-based secure communications in safety-related scenarios., , , , and . ISMICT, page 1-5. IEEE, (2016)Physical layer security based on spread-spectrum watermarking and jamming receiver., , , , and . Trans. Emerg. Telecommun. Technol., (2017)Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts., and . IEEE Trans. Inf. Forensics Secur., 7 (3): 1003-1017 (2012)A Blind Video Watermarking Algorithm for Copyright Protection based on Dual Tree Complex Wavelet Transform., , , and . J. Inf. Hiding Multim. Signal Process., 7 (6): 1147-1167 (2016)A privacy-preserving protocol for neural-network-based computation., , and . MM&Sec, page 146-151. ACM, (2006)Efficient pointwise and blockwise encrypted operations., , and . MM&Sec, page 85-90. ACM, (2008)VISION: a video and image dataset for source identification., , , , and . EURASIP J. Information Security, (2017)Oblivious Neural Network Computing via Homomorphic Encryption., , and . EURASIP J. Information Security, (2007)