Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Convergence analysis of the multiple-channel filtered-U recursive LMS algorithm for active noise control, and . Signal Processing, 80 (5): 849--856 (May 2000)A new model for Gabor coefficients' magnitude in face recognition., , and . ICASSP, page 982-985. IEEE, (2010)Hexagonal quantizers are not optimal for 2D data hiding., and . Security and Watermarking of Multimedia Contents, volume 5020 of SPIE Proceedings, page 623-631. SPIE, (2003)On distortion measures associated to random desynchronization attacks., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 65050D. SPIE, (2007)Putting the PRNU Model in Reverse Gear: Findings with Synthetic Signals., and . EUSIPCO, page 1352-1356. IEEE, (2018)On the co-existence of primary and secondary transmitters in a broadcast network., , and . CogART, page 27. ACM, (2011)On achievable security levels for lattice data hiding in the known message attack scenario., , and . MM&Sec, page 68-79. ACM, (2006)Quantization-based watermarking performance improvement using host statistics: AWGN attack case., , , , and . MM&Sec, page 35-39. ACM, (2004)Quantized projection data hiding., and . ICIP (2), page 889-892. IEEE, (2002)On the role of differentiation for resampling detection., , and . ICIP, page 1753-1756. IEEE, (2010)