Author of the publication

Comparison of Feature Extraction Techniques for Watermark Synchronization.

, , and . KES (4), volume 3684 of Lecture Notes in Computer Science, page 309-316. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Watermarking curves using 2D mesh spectral transform., , , and . ISCAS, page 2969-2972. IEEE, (2008)Detection of Upscale-Crop and Partial Manipulation in Surveillance Video Based on Sensor Pattern Noise., , , and . Sensors, 13 (9): 12605-12631 (2013)Document Forgery Detection with SVM Classifier and Image Quality Measures., , , and . PCM, volume 5353 of Lecture Notes in Computer Science, page 486-495. Springer, (2008)Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging., , , , and . Comput. Vis. Image Underst., 115 (9): 1308-1323 (2011)Robust watermark detection against D-A/A-D conversion for digital cinema using local auto-correlation function., , , , , and . ICIP, page 425-428. IEEE, (2008)Secure Bit-Plane Based Steganography for Secret Communication., , , and . IEICE Trans. Inf. Syst., 93-D (1): 79-86 (2010)Color laser printer identification by analyzing statistical features on discrete wavelet transform., , , , , and . ICIP, page 1505-1508. IEEE, (2009)Electrophotographic printer identification by halftone texture analysis., , , , and . ICASSP, page 1846-1849. IEEE, (2010)Towards Knowledge-Based Extraction of Roads from 1m-Resolution Satellite Images., , , and . SSIAI, page 171-181. IEEE Computer Society, (2000)Integrity Authentication Method for JPEG Images using Reversible Watermarking., , and . VISAPP (2), page 83-86. SciTePress, (2012)