From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Subsequent embedding in image steganalysis: Theoretical framework and practical applications., и . CoRR, (2021)Flexible image watermarking in JPEG domain., и . ISSPIT, стр. 311-316. IEEE, (2016)Robust Frequency Domain Audio Watermarking: A Tuning Analysis., , и . IWDW, том 3304 из Lecture Notes in Computer Science, стр. 244-258. Springer, (2004)DNA-inspired anonymous fingerprinting for efficient peer-to-peer content distribution., и . IEEE Congress on Evolutionary Computation, стр. 2376-2383. IEEE, (2013)Data hiding: New opportunities for security and privacy?. EICC, стр. 15:1-15:6. ACM, (2020)DISSIMILAR: Towards fake news detection using information hiding, signal processing and machine learning., , , и . ARES, стр. 66:1-66:9. ACM, (2021)Min-max constrained infinite horizon model predictive control: Standard vs. feedback formulation., , и . ECC, стр. 3765-3770. IEEE, (2001)A systematic method to enhance the robustness of stabilising receding-horizon predictive controllers., , и . ECC, стр. 831-836. IEEE, (1999)A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression., , и . Communications and Multimedia Security, том 2828 из Lecture Notes in Computer Science, стр. 226-238. Springer, (2003)Give more data, awareness and control to individual citizens, and they will help COVID-19 containment., , , , , , , , , и 30 other автор(ы). Trans. Data Priv., 13 (1): 61-66 (2020)