Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Drums, curve descriptors and affine invariant region matching., , , , and . Image Vis. Comput., 26 (3): 347-360 (2008)Determining Achievable Rates for Secure, Zero Divergence, Steganography., , , , and . ICIP, page 121-124. IEEE, (2006)Statistical restoration for robust and secure steganography., , , , and . ICIP (2), page 1118-1121. IEEE, (2005)The Degenerate Bounded Errors-in-Variables Model., , , and . SIAM J. Matrix Anal. Appl., 23 (1): 138-166 (2001)Tree semi-separable matrices: a simultaneous generalization of sequentially and hierarchically semi-separable representations., and . CoRR, (2024)Steganalysis for Markov cover data with applications to images., , , and . IEEE Trans. Inf. Forensics Secur., 1 (2): 275-287 (2006)'Print and Scan' Resilient Data Hiding in Images., , , , and . IEEE Trans. Inf. Forensics Secur., 1 (4): 464-478 (2006)An Eigenspace Update Algorithm for Image Analysis., , , , and . CVGIP: Graphical Model and Image Processing, 59 (5): 321-332 (1997)Toward Real-Time, Physically-Correct Soft Tissue Behavior Simulation., , and . ISBI, page 185-188. IEEE, (2004)Detection of hiding in the least significant bit., , , , and . IEEE Trans. Signal Process., 52 (10): 3046-3058 (2004)