Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Compression of Encrypted Video., , , and . DCC, page 173-182. IEEE Computer Society, (2007)On compressing encrypted data., , , , and . IEEE Trans. Signal Process., 52 (10): 2992-3006 (2004)Fingerprinting and forensic analysis of multimedia., and . ACM Multimedia, page 788-795. ACM, (2004)An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography., , , , , , and . Information Hiding, volume 3727 of Lecture Notes in Computer Science, page 327-341. Springer, (2005)Toward Compression of Encrypted Images and Video Sequences., , , and . IEEE Trans. Inf. Forensics Secur., 3 (4): 749-762 (2008)Iris Compression for Cryptographically Secure Person Identification., and . Data Compression Conference, page 459-468. IEEE Computer Society, (2004)EyeCerts., and . IEEE Trans. Inf. Forensics Secur., 1 (2): 144-153 (2006)On blind compression of encrypted data approaching the source entropy rate., , and . EUSIPCO, page 1-4. IEEE, (2005)On Compression of Encrypted Images., , and . ICIP, page 269-272. IEEE, (2006)