From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Subsequent embedding in image steganalysis: Theoretical framework and practical applications., и . CoRR, (2021)Data hiding: New opportunities for security and privacy?. EICC, стр. 15:1-15:6. ACM, (2020)DISSIMILAR: Towards fake news detection using information hiding, signal processing and machine learning., , , и . ARES, стр. 66:1-66:9. ACM, (2021)Min-max constrained infinite horizon model predictive control: Standard vs. feedback formulation., , и . ECC, стр. 3765-3770. IEEE, (2001)A systematic method to enhance the robustness of stabilising receding-horizon predictive controllers., , и . ECC, стр. 831-836. IEEE, (1999)Flexible image watermarking in JPEG domain., и . ISSPIT, стр. 311-316. IEEE, (2016)A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression., , и . Communications and Multimedia Security, том 2828 из Lecture Notes in Computer Science, стр. 226-238. Springer, (2003)DNA-inspired anonymous fingerprinting for efficient peer-to-peer content distribution., и . IEEE Congress on Evolutionary Computation, стр. 2376-2383. IEEE, (2013)Robust Frequency Domain Audio Watermarking: A Tuning Analysis., , и . IWDW, том 3304 из Lecture Notes in Computer Science, стр. 244-258. Springer, (2004)Security Approaches for Data Provenance in the Internet of Things: A Systematic Literature Review., , и . CoRR, (2024)