Author of the publication

New methodology for breaking steganographic techniques for JPEGs.

, , and . Security and Watermarking of Multimedia Contents, volume 5020 of SPIE Proceedings, page 143-155. SPIE, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Camera identification from cropped and scaled images., and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 68190E. SPIE, (2008)Practical steganalysis of digital images: state of the art., and . Security and Watermarking of Multimedia Contents, volume 4675 of SPIE Proceedings, page 1-13. SPIE, (2002)New methodology for breaking steganographic techniques for JPEGs., , and . Security and Watermarking of Multimedia Contents, volume 5020 of SPIE Proceedings, page 143-155. SPIE, (2003)Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 595-606. SPIE, (2005)A comparison study of CNN denoisers on PRNU extraction., , , , and . CoRR, (2021)Efficient Wet Paper Codes., , and . Information Hiding, volume 3727 of Lecture Notes in Computer Science, page 204-218. Springer, (2005)Steganalysis of Content-Adaptive Steganography in Spatial Domain., , , and . Information Hiding, volume 6958 of Lecture Notes in Computer Science, page 102-117. Springer, (2011)Images with Self-Correcting Capabilities., and . ICIP (3), page 792-796. IEEE, (1999)Further attacks on Yeung-Mintzer fragile watermarking scheme., , and . Security and Watermarking of Multimedia Contents, volume 3971 of SPIE Proceedings, page 428-437. SPIE, (2000)Detecting digital image forgeries using sensor pattern noise., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60720Y. SPIE, (2006)