Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Determining Achievable Rates for Secure, Zero Divergence, Steganography., , , , and . ICIP, page 121-124. IEEE, (2006)Statistical restoration for robust and secure steganography., , , , and . ICIP (2), page 1118-1121. IEEE, (2005)Detection of hiding in the least significant bit., , , , and . IEEE Trans. Signal Process., 52 (10): 3046-3058 (2004)An Eigenspace Update Algorithm for Image Analysis., , , , and . CVGIP: Graphical Model and Image Processing, 59 (5): 321-332 (1997)Fast algorithms for hierarchically semiseparable matrices., , , and . Numerical Lin. Alg. with Applic., 17 (6): 953-976 (2010)Drums, curve descriptors and affine invariant region matching., , , , and . Image Vis. Comput., 26 (3): 347-360 (2008)The Degenerate Bounded Errors-in-Variables Model., , , and . SIAM J. Matrix Anal. Appl., 23 (1): 138-166 (2001)Tree semi-separable matrices: a simultaneous generalization of sequentially and hierarchically semi-separable representations., and . CoRR, (2024)Steganalysis for Markov cover data with applications to images., , , and . IEEE Trans. Inf. Forensics Secur., 1 (2): 275-287 (2006)'Print and Scan' Resilient Data Hiding in Images., , , , and . IEEE Trans. Inf. Forensics Secur., 1 (4): 464-478 (2006)