Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FISH: Face intensity-shape histogram representation for automatic face splicing detection., , , , and . J. Vis. Commun. Image Represent., (2019)A Blind Video Watermarking Algorithm for Copyright Protection based on Dual Tree Complex Wavelet Transform., , , and . J. Inf. Hiding Multim. Signal Process., 7 (6): 1147-1167 (2016)DWT-based technique for spatio-frequency masking of digital signatures., , , , and . Security and Watermarking of Multimedia Contents, volume 3657 of SPIE Proceedings, page 31-39. SPIE, (1999)Evaluating the performance of ST-DM watermarking in nonadditive channels., , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 859-869. SPIE, (2004)Watermark capacity measure incorporating a model of the human visual system., , , and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 483-494. SPIE, (2001)Analysis of data hiding technologies for medical images., , , , and . Security and Watermarking of Multimedia Contents, volume 5020 of SPIE Proceedings, page 379-390. SPIE, (2003)Improving the robustness of nonadditive watermarks through optimum detection theory., , , , and . Security and Watermarking of Multimedia Contents, volume 3971 of SPIE Proceedings, page 2-13. SPIE, (2000)A Dataset for Forensic Analysis of Videos in the Wild., , , , and . TIWDC, volume 766 of Communications in Computer and Information Science, page 84-94. Springer, (2017)A Hybrid Approach to Video Source Identification., , , and . CoRR, (2017)A privacy-preserving protocol for neural-network-based computation., , and . MM&Sec, page 146-151. ACM, (2006)