Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards geometrically robust data-hiding with structured codebooks., , , , and . Multimedia Syst., 11 (2): 121-132 (2005)Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising., , and . ICASSP, page 3253-3256. IEEE Computer Society, (1999)A Note on the Periodicity and the Output Rate of Bit Search Type Generators., , , and . IEEE Trans. Information Theory, 54 (2): 666-679 (2008)The parallel-Gaussian watermarking game., and . IEEE Trans. Information Theory, 50 (2): 272-289 (2004)Perceptual hash based blind geometric synchronization of images for watermarking., and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 68191G. SPIE, (2008)Collusion-resistant intentional de-synchronization for digital video fingerprinting., and . ICIP (1), page 237-240. IEEE, (2005)On Detection With Partial Information In The Gaussian Setup, , and . CoRR, (2009)Towards Exploring Fundamental Limits of System-Specific Cryptanalysis Within Limited Attack Classes: Application to ABSG, and . CoRR, (2008)Low-complexity image denoising based on statistical modeling of wavelet coefficients., , , and . IEEE Signal Process. Lett., 6 (12): 300-303 (1999)Information embedding codes matched to locally stationary Gaussian image models., and . ICIP (2), page 137-140. (2002)