Author of the publication

Rare event probability estimation using information projection.

, , and . ISITA, page 251-255. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Natural Steganography Embedding Scheme Dedicated to Color Sensors in the JPEG Domain., , , and . Media Watermarking, Security, and Forensics, Society for Imaging Science and Technology, (2019)Document authentication using graphical codes: reliable performance analysis and channel optimization., , , and . EURASIP J. Information Security, (2014)Simulation of DS-CDMA on the LOS multipath 60 GHz channel and performance with RAKE receiver., and . PIMRC, page 1232-1236. IEEE, (2003)Critères BIC et AIC pour les chaînes de Markov cachées. Application aux communications numériques., , and . Traitement du Signal, 31 (3-4): 383-400 (2014)Natural Steganography in JPEG Domain With a Linear Development Pipeline., , , and . IEEE Trans. Inf. Forensics Secur., (2021)An Empirical Study of Steganography and Steganalysis of Color Images in the JPEG Domain., , , and . IWDW, volume 11378 of Lecture Notes in Computer Science, page 290-303. Springer, (2018)Document Authentication Using 2D Codes: Maximizing the Decoding Performance Using Statistical Inference., , , and . Communications and Multimedia Security, volume 7394 of Lecture Notes in Computer Science, page 39-54. Springer, (2012)A low complexity suboptimal MIMO receiver: the combined ZF-MLD algorithm., , , and . PIMRC, page 2271-2275. IEEE, (2003)Blind Detection of Severely Blurred 1D Barcode., , , and . GLOBECOM, page 1-5. IEEE, (2010)EM-Based joint symbol and blur estimation for 2D barcode., , , and . ISPA, page 32-36. IEEE, (2011)