Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Binary Tardos Codes and Zero-bit Watermarking.. (2018)Group Testing for Identification with Privacy., and . IH&MMSec, page 51-56. ACM, (2016)A New Measure of Watermarking Security: The Effective Key Length., and . IEEE Trans. Inf. Forensics Secur., 8 (8): 1306-1317 (2013)Joint Learning of Assignment and Representation for Biometric Group Membership., , and . ICASSP, page 2922-2926. IEEE, (2020)Note: An alternative proof of the vulnerability of k-NN classifiers in high intrinsic dimensionality regions.. CoRR, (2020)Memory Vectors for Similarity Search in High-Dimensional Spaces., , , , and . IEEE Trans. Big Data, 4 (1): 65-77 (2018)Some theoretical aspects of watermarking detection., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60721G. SPIE, (2006)Applied public-key steganography., , and . Security and Watermarking of Multimedia Contents, volume 4675 of SPIE Proceedings, page 38-49. SPIE, (2002)Mixer: DNN Watermarking using Image Mixup., and . CoRR, (2022)An asymmetric watermarking method., and . IEEE Trans. Signal Process., 51 (4): 981-995 (2003)