From post

Coping with local geometric attacks by means of optic-flow-based resynchronization for robust watermarking.

, , , и . Security, Steganography, and Watermarking of Multimedia Contents, том 5681 из Proceedings of SPIE, стр. 164-174. SPIE, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the implementation of the discrete Fourier transform in the encrypted domain., , и . IEEE Trans. Inf. Forensics Secur., 4 (1): 86-97 (2009)Identification of VoIP Speech With Multiple Domain Deep Features., , , и . IEEE Trans. Inf. Forensics Secur., (2020)CNN-Based Adversarial Embedding for Image Steganography., , , , и . IEEE Trans. Inf. Forensics Secur., 14 (8): 2074-2087 (2019)ArtShop: an art-oriented image-processing tool for cultural heritage applications., , , , и . Comput. Animat. Virtual Worlds, 14 (3): 149-158 (2003)Watermark-Based Authentication., , и . Intelligent Multimedia Analysis for Security Applications, том 282 из Studies in Computational Intelligence, Springer, (2010)A Full-Reference Quality Metric for Geometrically Distorted Images., , и . IEEE Trans. Image Process., 19 (4): 867-881 (2010)Analysis of the security of linear blinding techniques from an information theoretical point of view., , и . ICASSP, стр. 5852-5855. IEEE, (2011)Steganography in Digital Media: Principles, Algorithms, and Applications (Fridrich, J. 2010) Book Reviews.. IEEE Signal Process. Mag., 28 (5): 142-144 (2011)A gradient-based pixel-domain attack against SVM detection of global image manipulations., , , , , и . WIFS, стр. 1-6. IEEE, (2017)Enhancing Privacy in Remote Data Classification., , , , и . SEC, том 278 из IFIP, стр. 33-46. Springer, (2008)