Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Benchmarking steganographic and steganalysis techniques., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 252-263. SPIE, (2005)Improved utilization of embedding distortion in scalar quantization based data hiding techniques, , , and . Signal Processing, 87 (5): 877--890 (May 2007)An overview of scalar quantization based data hiding methods, , and . Signal Processing, 86 (5): 893--914 (May 2006)PSteg: steganographic embedding through patching., , , and . ICASSP (2), page 537-540. IEEE, (2005)Tackling In-Camera Downsizing for Reliable Camera ID Verification., , , and . Media Watermarking, Security, and Forensics, Society for Imaging Science and Technology, (2019)A Survey on Predicting the Factuality and the Bias of News Media., , , , , and . ACL (Findings), page 15947-15962. Association for Computational Linguistics, (2024)Towards measuring uniqueness of human voice., , and . WIFS, page 1-6. IEEE, (2017)Preprocessing tool for compressed video editing., and . MMSP, page 283-288. IEEE, (1999)An efficient and robust method for detecting copy-move forgery., , and . ICASSP, page 1053-1056. IEEE, (2009)Recent advances in counter PRNU based source attribution and beyond., , , and . Media Watermarking, Security, and Forensics, volume 9409 of SPIE Proceedings, page 94090N. SPIE, (2015)