Author of the publication

A Verifiable Fingerprint Vault Scheme.

, , , , and . KES (3), volume 3683 of Lecture Notes in Computer Science, page 1072-1078. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VQ Image Coding Using Sub-Vector Techniques., , and . ICIP, page 160-163. IEEE, (2000)Watermarking Combined with CELP Speech Coding for Authentication., , and . IEICE Trans. Inf. Syst., 88-D (2): 330-334 (2005)Vector quantization based on genetic simulated annealing., , , , and . Signal Process., 81 (7): 1513-1523 (2001)Security of autoregressive speech watermarking model under guessing attack., , and . IEEE Trans. Inf. Forensics Secur., 1 (3): 386-390 (2006)Statistical Analysis of Two Polarity Detection Schemes in Speech Watermarking., , , and . ROCLING, Association for Computational Linguistics and Chinese Language Processing (ACLCLP), Taiwan, (2005)A Robust 3D Model Watermarking Scheme Based on Feature Recognition., , , and . SNPD (3), page 989-993. IEEE Computer Society, (2007)Image Robust Hashing Based on DCT Sign., and . IIH-MSP, page 131-134. IEEE Computer Society, (2006)Analysis of Anonymity on the Signatures of Knowledge., and . IIH-MSP, page 621-624. IEEE Computer Society, (2006)Rotation, Scaling and Translation Invariant Blind Digital Watermarking for 3D Mesh Models., and . ICICIC (3), page 463-466. IEEE Computer Society, (2006)Multipurpose image watermarking algorithm based on multistage vector quantization., , and . IEEE Trans. Image Process., 14 (6): 822-831 (2005)