Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Exploring Fundamental Limits of System-Specific Cryptanalysis Within Limited Attack Classes: Application to ABSG, and . CoRR, (2008)Perceptual hash based blind geometric synchronization of images for watermarking., and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 68191G. SPIE, (2008)The parallel-Gaussian watermarking game., and . IEEE Trans. Inf. Theory, 50 (2): 272-289 (2004)Towards geometrically robust data-hiding with structured codebooks., , , , and . Multim. Syst., 11 (2): 121-132 (2005)A Note on the Periodicity and the Output Rate of Bit Search Type Generators., , , and . IEEE Trans. Inf. Theory, 54 (2): 666-679 (2008)Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising., , and . ICASSP, page 3253-3256. IEEE Computer Society, (1999)Information embedding codes matched to locally stationary Gaussian image models., and . ICIP (2), page 137-140. IEEE, (2002)Robust perceptual image hashing via matrix invariants., , and . ICIP, page 3443-3446. IEEE, (2004)Temporal synchronization of watermarked video using image hashing., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 370-380. SPIE, (2005)Low-complexity image denoising based on statistical modeling of wavelet coefficients., , , and . IEEE Signal Process. Lett., 6 (12): 300-303 (1999)