Author of the publication

Implementing the discrete Fourier transform in the encrypted domain.

, , and . ICASSP, page 1757-1760. IEEE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Watermark capacity measure incorporating a model of the human visual system., , , and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 483-494. SPIE, (2001)DWT-based technique for spatio-frequency masking of digital signatures., , , , and . Security and Watermarking of Multimedia Contents, volume 3657 of SPIE Proceedings, page 31-39. SPIE, (1999)Evaluating the performance of ST-DM watermarking in nonadditive channels., , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 859-869. SPIE, (2004)Improving the robustness of nonadditive watermarks through optimum detection theory., , , , and . Security and Watermarking of Multimedia Contents, volume 3971 of SPIE Proceedings, page 2-13. SPIE, (2000)Analysis of data hiding technologies for medical images., , , , and . Security and Watermarking of Multimedia Contents, volume 5020 of SPIE Proceedings, page 379-390. SPIE, (2003)An efficient buyer-seller watermarking protocol based on composite signal representation., , , and . MM&Sec, page 9-18. ACM, (2009)Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts., and . IEEE Trans. Inf. Forensics Secur., 7 (3): 1003-1017 (2012)Effectiveness of ST-DM Watermarking Against Intra-video Collusion., , , and . IWDW, volume 3710 of Lecture Notes in Computer Science, page 158-170. Springer, (2005)A privacy-preserving protocol for neural-network-based computation., , and . MM&Sec, page 146-151. ACM, (2006)Efficient pointwise and blockwise encrypted operations., , and . MM&Sec, page 85-90. ACM, (2008)