From post

Hexagonal quantizers are not optimal for 2D data hiding.

, и . Security and Watermarking of Multimedia Contents, том 5020 из SPIE Proceedings, стр. 623-631. SPIE, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A framework for soft hashing and its application to robust image hashing., , , и . ICIP, стр. 397-400. IEEE, (2004)Markov Modelling of Fingerprinting Systems for Collision Analysis., , и . EURASIP J. Information Security, (2008)The role of permutation coding in minimum-distortion perfect counterforensics.. ICASSP, стр. 6240-6244. IEEE, (2014)Towards Optimum Counterforensics of Multiple Significant Digits Using Majorisation-Minimisation., и . ICASSP, стр. 2116-2120. IEEE, (2018)On the Shannon capacity of DNA data embedding.. ICASSP, стр. 1766-1769. IEEE, (2010)Genetic Channel Capacity Revisited.. BIONETICS, том 103 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 85-98. Springer, (2011)On the embedding capacity of DNA strands under substitution, insertion, and deletion mutations.. Media Forensics and Security, том 7541 из SPIE Proceedings, стр. 754114. SPIE, (2010)Coding at the sample level for data hiding: turbo and concatenated codes., и . Security and Watermarking of Multimedia Contents, том 4314 из SPIE Proceedings, стр. 532-543. SPIE, (2001)New results on robustness of secure steganography., , , и . Security, Steganography, and Watermarking of Multimedia Contents, том 6072 из SPIE Proceedings, стр. 60720U. SPIE, (2006)Performance analysis of existing and new methods for data hiding with known-host information in additive channels., , и . IEEE Trans. Signal Process., 51 (4): 960-980 (2003)