Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new model for Gabor coefficients' magnitude in face recognition., , and . ICASSP, page 982-985. IEEE, (2010)Report on Dirty Paper Coding Estimation with multidimensional lattices., and . CoRR, (2016)On achievable security levels for lattice data hiding in the known message attack scenario., , and . MM&Sec, page 68-79. ACM, (2006)Quantization-based watermarking performance improvement using host statistics: AWGN attack case., , , , and . MM&Sec, page 35-39. ACM, (2004)Meet the Family of Statistical Disclosure Attacks., , and . CoRR, (2019)Understanding the Effects of Real-World Behavior in Statistical Disclosure Attacks., , and . CoRR, (2019)Algebraic solution to the robust SPR problem for two polynomials., and . Autom., 37 (5): 757-762 (2001)Rational dither modulation: a novel data-hiding method robust to value-metric scaling attacks., , , and . MMSP, page 139-142. IEEE, (2004)Fully Private Noninteractive Face Verification., , and . IEEE Trans. Inf. Forensics Secur., 8 (7): 1101-1114 (2013)Improving PRNU Compression Through Preprocessing, Quantization, and Coding., , , and . IEEE Trans. Inf. Forensics Secur., 14 (3): 608-620 (2019)