Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unified approach of asymmetric watermarking schemes., , and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 269-279. SPIE, (2001)Oracle Channels.. Trans. Data Hiding Multim. Secur., (2008)Sturmian Graphs and a Conjecture of Moser., , , and . Developments in Language Theory, volume 3340 of Lecture Notes in Computer Science, page 175-187. Springer, (2004)On Sturmian graphs., , , and . Discret. Appl. Math., 155 (8): 1014-1030 (2007)Oracle Attacks and Covert Channels.. IWDW, volume 3710 of Lecture Notes in Computer Science, page 171-185. Springer, (2005)Counteracting Oracle attacks.. MM&Sec, page 187-192. ACM, (2004)Reality preserving fractional transforms signal processing applications., and . ICASSP (5), page 205-208. IEEE, (2004)