Author of the publication

Public automated web-based evaluation service for watermarking schemes: StirMark benchmark.

, , , , , and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 575-584. SPIE, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New results about Tu-Deng's conjecture., , and . ISIT, page 485-489. IEEE, (2016)Better security levels for broken arrows., , and . Media Forensics and Security, volume 7541 of SPIE Proceedings, page 75410H. SPIE, (2010)A New Ultrafast Stream Cipher Design: COS Ciphers., and . IMACC, volume 2260 of Lecture Notes in Computer Science, page 85-98. Springer, (2001)COS Ciphers are not "extremely weak"! - The Design Rationale of COS Ciphers., and . IACR Cryptology ePrint Archive, (2001)Towards robust and secure watermarking., , and . MM&Sec, page 153-160. ACM, (2010)A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols., , and . SP, page 125-141. IEEE, (2022)A note on Ring-LWE security in the case of Fully Homomorphic Encryption., and . IACR Cryptology ePrint Archive, (2016)Highly Nonlinear Balanced Boolean Functions with a Good Correlation-Immunity., and . EUROCRYPT, volume 1403 of Lecture Notes in Computer Science, page 475-488. Springer, (1998)On-off keying modulation and tardos fingerprinting., , and . MM&Sec, page 101-106. ACM, (2008)Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions., , , and . EUROCRYPT, volume 1807 of Lecture Notes in Computer Science, page 507-522. Springer, (2000)