Author of the publication

Implementing the discrete Fourier transform in the encrypted domain.

, , and . ICASSP, page 1757-1760. IEEE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Watermark-Based Authentication., , and . Intelligent Multimedia Analysis for Security Applications, volume 282 of Studies in Computational Intelligence, Springer, (2010)A Full-Reference Quality Metric for Geometrically Distorted Images., , and . IEEE Trans. Image Process., 19 (4): 867-881 (2010)ArtShop: an art-oriented image-processing tool for cultural heritage applications., , , , and . Comput. Animat. Virtual Worlds, 14 (3): 149-158 (2003)Identification of VoIP Speech With Multiple Domain Deep Features., , , and . IEEE Trans. Inf. Forensics Secur., (2020)CNN-Based Adversarial Embedding for Image Steganography., , , , and . IEEE Trans. Inf. Forensics Secur., 14 (8): 2074-2087 (2019)On the implementation of the discrete Fourier transform in the encrypted domain., , and . IEEE Trans. Inf. Forensics Secur., 4 (1): 86-97 (2009)On the performance of multiplicative spread spectrum watermarking., , and . IEEE Workshop on Multimedia Signal Processing, page 324-327. IEEE, (2002)Compressive hyperspectral imaging using progressive total variation., , , , and . ICASSP, page 7794-7798. IEEE, (2014)Dealing with uncertainty in image forensics: A fuzzy approach., and . ICASSP, page 1753-1756. IEEE, (2012)Rational dither modulation: a novel data-hiding method robust to value-metric scaling attacks., , , and . MMSP, page 139-142. IEEE, (2004)