Author of the publication

Secure hybrid robust watermarking resistant against tampering and copy attack.

, , and . Signal Process., 83 (10): 2133-2170 (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Countermeasures for unintentional and intentional video watermarking attacks., , and . Security and Watermarking of Multimedia Contents, volume 3971 of SPIE Proceedings, page 346-357. SPIE, (2000)A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking., , , and . Information Hiding, volume 1768 of Lecture Notes in Computer Science, page 270-285. Springer, (1999)Method for the estimation and recovering from general affine transforms in digital watermarking applications., , and . Security and Watermarking of Multimedia Contents, volume 4675 of SPIE Proceedings, page 313-322. SPIE, (2002)Visual communications with side information via distributed printing channels: extended multimedia and security perspectives., , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 428-445. SPIE, (2004)Quality enhancement of printed-and-scanned images using distributed coding., , , and . Signal Process., 87 (6): 1301-1313 (2007)Optimal adaptive diversity watermarking with channel state estimation., , , and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 673-685. SPIE, (2001)A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents., , , , , , , and . Communications and Multimedia Security, volume 3677 of Lecture Notes in Computer Science, page 280-281. Springer, (2005)Efficient Segmentation and Camera Motion Indexing of Compressed Video., , and . Real Time Imaging, 5 (4): 231-241 (1999)Data hiding capacity analysis for real images based on stochastic nonstationary geometrical models., , , and . Security and Watermarking of Multimedia Contents, volume 5020 of SPIE Proceedings, page 580-593. SPIE, (2003)Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding., , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 65051T. SPIE, (2007)