Author of the publication

Trellis coded modulation to improve dirty paper trellis watermarking.

, , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 65050G. SPIE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A comparative study of +/- steganalyzers., , , and . MMSP, page 791-796. IEEE Signal Processing Society, (2008)Detection of motion-incoherent components in video streams., , and . IEEE Trans. Inf. Forensics Secur., 4 (1): 49-58 (2009)Next-Generation Access Tokens to Fight CDN Leeching., and . MHV, page 111-112. ACM, (2024)Exploring color information to characterize camcorder piracy., , , and . WIFS, page 132-137. IEEE, (2013)A population of eagles, horses, and moles: Perceptual sensitivity to watermark disparity coherence., and . WIFS, page 1-6. IEEE, (2015)Exploiting self-similarities to defeat digital watermarking systems: a case study on still images., , and . MM&Sec, page 133-142. ACM, (2004)Semi-blind automatic temporal registration for video watermarking systems., , and . ICASSP, page 2853-2856. IEEE, (2013)Secure Video Watermarking via Embedding Strength Modulation., and . IWDW, volume 2939 of Lecture Notes in Computer Science, page 340-354. Springer, (2003)Blind detection for disparity-coherent stereo video watermarking., , and . Media Watermarking, Security, and Forensics, volume 9028 of SPIE Proceedings, page 90280B. SPIE, (2014)Trellis coded modulation to improve dirty paper trellis watermarking., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 65050G. SPIE, (2007)