Author of the publication

Unitary embedding for data hiding with the SVD.

, and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 619-630. SPIE, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Load Average and its Relationship to Program Run Time on Networks of Workstations., , and . J. Parallel Distributed Comput., 44 (2): 141-146 (1997)Will Automatically Importing User Data Help Overcome the Blank Slate Problem?, , , , , , and . CHI Extended Abstracts, ACM, (2018)Feature selection for steganalysis using the Mahalanobis distance., and . Media Forensics and Security, volume 7541 of SPIE Proceedings, page 754104. SPIE, (2010)Participatory design with older adults: an analysis of creativity in the design of mobile healthcare applications., and . Creativity & Cognition, page 114-123. ACM, (2013)Steganalysis Using Partially Ordered Markov Models., and . Information Hiding, volume 6387 of Lecture Notes in Computer Science, page 118-132. Springer, (2010)Older Adults and Free/Open Source Software: A Diary Study of First-Time Contributors., , , , and . OpenSym, page 5:1-5:10. ACM, (2014)Optimal closed boundary identification in gray-scale imagery., , and . J. Math. Imaging Vis., 5 (3): 179-205 (1995)What health topics older adults want to track: a participatory design study., and . ASSETS, page 26:1-26:8. ACM, (2013)Coping with duplicate bug reports in free/open source software projects., , and . VL/HCC, page 101-108. IEEE, (2011)Unitary embedding for data hiding with the SVD., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 619-630. SPIE, (2005)