From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure robust digital watermarking using the lapped orthogonal transform., , и . Security and Watermarking of Multimedia Contents, том 3657 из SPIE Proceedings, стр. 21-30. SPIE, (1999)Optimal transform domain watermark embedding via linear programming., , и . Signal Process., 81 (6): 1251-1260 (2001)Secure Copyright Protection Techniques for Digital Images., , , , и . Information Hiding, том 1525 из Lecture Notes in Computer Science, стр. 169-190. Springer, (1998)Fast Robust Template Matching for Affine Resistant Image Watermarks., и . Information Hiding, том 1768 из Lecture Notes in Computer Science, стр. 199-210. Springer, (1999)A Secure Robust Digital Image Watermark., и . Electronic Imaging, том 3409 из SPIE Proceedings, стр. 150-163. SPIE, (1998)An iterative template matching algorithm using the Chirp-Z transform for digital image watermarking., и . Pattern Recognit., 33 (1): 173-175 (2000)Robust template matching for affine resistant image watermarks., и . IEEE Trans. Image Processing, 9 (6): 1123-1129 (2000)Attacks on digital watermarks: classification, estimation-based attacks, and benchmarks., , , , и . IEEE Commun. Mag., 39 (8): 118-126 (2001)Template Based Recovery of Fourier-Based Watermarks Using Log-Polar and Log-Log Maps., , , , и . ICMCS, Vol. 1, стр. 870-874. IEEE Computer Society, (1999)Second Generation Benchmarking and Application Oriented Evaluation., , , , и . Information Hiding, том 2137 из Lecture Notes in Computer Science, стр. 340-353. Springer, (2001)