Author of the publication

Information embedding and extraction for electrophotographic printing processes.

, , , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 607210. SPIE, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Signature-embedding in printed documents for security and forensic applications., , , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 455-466. SPIE, (2004)Forensic classification of imaging sensor types., , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 65050U. SPIE, (2007)Information embedding and extraction for electrophotographic printing processes., , , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 607210. SPIE, (2006)Banding Artifact Reduction for a Class of Color Electrophotographic Printers With Underactuated Motor/Gear Configuration., and . IEEE Trans. Control. Syst. Technol., 16 (4): 577-588 (2008)Image Analysis as a Tool for Printer Characterization and Halftoning Algorithm Development (invited)., , , , , and . SSIAI, page 3-8. IEEE Computer Society, (2002)Real-time measurement of eccentric motion with capacitive sensor for hydraulic pumps., , and . ACC, page 3687-3692. IEEE, (2009)Forensic techniques for classifying scanner, computer generated and digital camera images., , , and . ICASSP, page 1653-1656. IEEE, (2008)Contouring control of machine tool feed drive systems: a task coordinate frame approach., and . IEEE Trans. Contr. Sys. Techn., 9 (1): 130-139 (2001)Improvements on image authentication and recovery using distributed source coding., , , , and . Media Forensics and Security, volume 7254 of SPIE Proceedings, page 725415. SPIE, (2009)Printer identification based on graylevel co-occurrence features for security and forensic applications.., , , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 430-440. SPIE, (2005)