Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forensic watermarking and bit-rate conversion of partially encrypted AAC bitstreams., , , and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 681910. SPIE, (2008)A secure multidimensional point inclusion protocol., , , and . MM&Sec, page 109-120. ACM, (2007)Tardos fingerprinting is better than we thought, , , and . CoRR, (2006)Gray-level-embedded lossless image compression., , and . Signal Process. Image Commun., 18 (6): 443-454 (2003)A hierarchical image authentication watermark with improved localization and security., , , and . ICIP (2), page 502-505. IEEE, (2001)Universal image steganalysis using rate-distortion curves., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 467-476. SPIE, (2004)Tardos fingerprinting codes in the combined digit model., , , and . WIFS, page 41-45. IEEE, (2009)Watermarking low bit-rate Advanced Simple Profile MPEG-4 bitstreams., , and . ICASSP (3), page 513-516. IEEE, (2003)Secure Embedding of Spread Spectrum Watermarks using Look-up-Tables., , , and . ICASSP (2), page 153-156. IEEE, (2007)A Buyer-Seller Watermarking Protocol Based on Secure Embedding., , , , and . IEEE Trans. Inf. Forensics Secur., 3 (4): 783-786 (2008)