Author of the publication

Coping with local geometric attacks by means of optic-flow-based resynchronization for robust watermarking.

, , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 164-174. SPIE, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast vector median filter based on Euclidean norm approximation., , and . IEEE Signal Process. Lett., 1 (6): 92-94 (1994)Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge., , , , and . IEEE Trans. Circuits Syst. Video Technol., 32 (6): 4081-4095 (2022)Asymptotically optimum universal watermark embedding and detection in the high-SNR regime., , and . IEEE Trans. Inf. Theory, 56 (6): 2804-2815 (2010)Which country is this picture from? New data and methods for DNN-based country recognition., , , , and . CoRR, (2022)A Master Key Backdoor for Universal Impersonation Attack against DNN-based Face Verification., , and . CoRR, (2021)A One-Class Classifier for the Detection of GAN Manipulated Multi-Spectral Satellite Images., , and . CoRR, (2023)Adversarial Kendall's Model Towards Containment of Distributed Cyber-Threats., , , and . IEEE Trans. Inf. Forensics Secur., (2021)ArtShop: a tool for art image processing., , , , and . DSP, page 103-106. IEEE, (2002)Image Diversity Analysis: Context, Opinion and Bias., , , , , , , , and . LivingWeb@ISWC, volume 515 of CEUR Workshop Proceedings, CEUR-WS.org, (2009)Robust Retraining-free GAN Fingerprinting via Personalized Normalization., , , and . WIFS, page 1-6. IEEE, (2023)