Author of the publication

A joint asymmetric watermarking and image encryption scheme.

, , , and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 68191A. SPIE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessing the Impact of Image Manipulation and Image Context on Users' Perceptions of Deception, , , , and . IS&T/SPIE Electronic Imaging, page Accepted. (2014)Detecting photo manipulation on signs and billboards., , and . ICIP, page 1741-1744. IEEE, (2010)A New Approach for Ageing at Home: The CAPTAIN System., , , , , , , , , and 10 other author(s). MedInfo, volume 264 of Studies in Health Technology and Informatics, page 1704-1705. IOS Press, (2019)RAISE: a raw images dataset for digital image forensics., , , and . MMSys, page 219-224. ACM, (2015)A joint asymmetric watermarking and image encryption scheme., , , and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 68191A. SPIE, (2008)Multi-device Interaction for Content Sharing., , and . EMASC@MM, page 29-34. ACM, (2014)Near lossless reversible data hiding based on adaptive prediction., , , and . ICIP, page 2585-2588. IEEE, (2010)Exposing Digital Forgeries in Ballistic Motion., , and . IEEE Trans. Inf. Forensics Secur., 7 (1): 283-296 (2012)Joint detection of full-frame linear filtering and JPEG compression in digital images., , and . WIFS, page 156-161. IEEE, (2013)Detecting photographic and computer generated composites., and . Image Processing: Algorithms and Systems, volume 7870 of SPIE Proceedings, page 78700A. SPIE, (2011)