Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New attacks on SARI image authentication system., , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 602-609. SPIE, (2004)Detecting Malicious Web Links and Identifying Their Attack Types., , and . WebApps, USENIX Association, (2011)A Heuristic Framework to Detect Concurrency Vulnerabilities., , , , and . ACSAC, page 529-541. ACM, (2018)Multiresolution scene-based video watermarking using perceptual models., , and . IEEE J. Sel. Areas Commun., 16 (4): 540-550 (1998)A comprehensive human computation framework: with application to image labeling., , , , , and . ACM Multimedia, page 479-488. ACM, (2008)Signed MSB-Set Comb Method for Elliptic Curve Point Multiplication., , , and . ISPEC, volume 3903 of Lecture Notes in Computer Science, page 13-24. Springer, (2006)Data Hiding for Video-in-Video., , and . ICIP (2), page 676-679. IEEE Computer Society, (1997)Fine Granularity Scalability Encryption of MPEG-4 FGS Bitstreams., , , and . MMSP, page 1-4. IEEE, (2005)When DRM Meets Restricted Multicast: A Content Encryption Key Scheme for Multicast Encryption and DRM., and . CCNC, page 1048-1052. IEEE, (2007)An efficient key scheme for multiple access of JPEG 2000 and motion JPEG 2000 enabling truncations., , and . CCNC, page 1124-1128. IEEE, (2006)