Author of the publication

Adaptive steganography.

, , and . Security and Watermarking of Multimedia Contents, volume 4675 of SPIE Proceedings, page 69-78. SPIE, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The return of public investment in telecommunications: Assessing the early challenges of the national broadband network policy in Australia.. Comput. Law Secur. Rev., 28 (2): 220-230 (2012)Tweetorial Hooks: Generative AI Tools to Motivate Science on Social Media., , , , , , , , and . CoRR, (2023)Finding ikigai: How robots can support meaning in later life., , , , , , , , and . Frontiers Robotics AI, (2022)Adaptive steganography., , and . Security and Watermarking of Multimedia Contents, volume 4675 of SPIE Proceedings, page 69-78. SPIE, (2002)Eliciting Topic Hierarchies from Large Language Models., , and . CoRR, (2023)Large-Scale Experiments on Data-Driven Design of Commercial Spoken Dialog Systems., , , , and . INTERSPEECH, page 813-816. ISCA, (2011)A quantitative model of the initiation of DNA replication in Saccharomyces cerevisiae predicts the effects of system perturbations., , , , , , and . BMC Syst. Biol., (2012)An in situ silver cationization method for hydrocarbon mass spectrometry, , and . Journal of the American Society for Mass Spectrometry, 16 (4): 437--440 (January 2005)Logic Design of Neural Networks for High-Throughput and Low-Power Applications., , , and . CoRR, (2023)Machine Learning in Advanced IC Design: A Methodological Survey., , , , and . IEEE Des. Test, 40 (1): 17-33 (February 2023)