Author of the publication

Secure Steganography: Statistical Restoration of the Second Order Dependencies for Improved Security.

, , , , and . ICASSP (2), page 277-280. IEEE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Feature fusion and redundancy pruning for rush video summarization., , , , , , and . TVS, page 84-88. ACM, (2007)Adding Gaussian noise to "denoise" JPEG for detecting image resizing., , and . ICIP, page 1493-1496. IEEE, (2009)Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding scheme., , , and . ICIP, page 1292-1295. IEEE, (2008)Secure Steganography: Statistical Restoration of the Second Order Dependencies for Improved Security., , , , and . ICASSP (2), page 277-280. IEEE, (2007)UThe Vision Research Lab of UCSB at TRECVID 2007., , , , , , , and . TRECVID, National Institute of Standards and Technology (NIST), (2007)Steganographic capacity estimation for the statistical restoration framework., , and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 681916. SPIE, (2008)Adaptive MPEG-2 video data hiding scheme., , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 65051D. SPIE, (2007)Online Evaluation of Steel Slab Quality in Production Phase by Surface Crack Image Segmentation using Relative Fuzzy Connectedness., , , , and . IPCV, page 353-362. CSREA Press, (2007)Matrix embedding with pseudorandom coefficient selection and error correction for robust and secure steganography., , and . IEEE Trans. Inf. Forensics Secur., 5 (2): 225-239 (2010)Enforcing Linearity in DNN Succours Robustness and Adversarial Image Generation., and . ICANN (1), volume 12396 of Lecture Notes in Computer Science, page 52-64. Springer, (2020)