Author of the publication

Critères BIC et AIC pour les chaînes de Markov cachées. Application aux communications numériques.

, , and . Traitement du Signal, 31 (3-4): 383-400 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Natural Steganography Embedding Scheme Dedicated to Color Sensors in the JPEG Domain., , , and . Media Watermarking, Security, and Forensics, Society for Imaging Science and Technology, (2019)Simulation of DS-CDMA on the LOS multipath 60 GHz channel and performance with RAKE receiver., and . PIMRC, page 1232-1236. IEEE, (2003)Document authentication using graphical codes: reliable performance analysis and channel optimization., , , and . EURASIP J. Information Security, (2014)EM-Based joint symbol and blur estimation for 2D barcode., , , and . ISPA, page 32-36. IEEE, (2011)Computing Dependencies between DCT Coefficients for Natural Steganography in JPEG Domain., , , and . IH&MMSec, page 57-62. ACM, (2019)Rare event probability estimation using information projection., , and . ISITA, page 251-255. IEEE, (2016)JPEG Steganography and Synchronization of DCT Coefficients for a Given Development Pipeline., , , and . IH&MMSec, page 139-149. ACM, (2020)Document authentication using graphical codes: impacts of the channel model., , , and . IH&MMSec, page 87-94. ACM, (2013)Image model and printed document authentication: A theoretical analysis., , and . ICIP, page 5377-5381. IEEE, (2014)Authentication using graphical codes: Optimisation of the print and scan channels., , , and . EUSIPCO, page 800-804. IEEE, (2014)