Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Steganalysis based on Markov Model of Thresholded Prediction-Error Image., , , and . ICME, page 1365-1368. IEEE Computer Society, (2006)Rake transform and edge statistics for image forgery detection., , , and . ICME, page 1463-1468. IEEE Computer Society, (2010)A phase-space reconstruction approach to detect covert channels in TCP/IP protocols., and . WIFS, page 1-6. IEEE, (2010)Reference index-based H.264 video watermarking scheme., , , and . TOMCCAP, 8 (S2): 33:1-33:22 (2012)Reversible data hiding based on wavelet spread spectrum., , , , and . MMSP, page 211-214. IEEE, (2004)Hiding Data in Multimedia Streaming over Networks., , and . CNSR, page 50-55. IEEE Computer Society, (2010)An Objective Distortion Measure for Binary Document Images Based on Human Visual Perceptio., , , and . ICPR (4), page 239-242. IEEE Computer Society, (2002)Do biometric images follow Benford's law?, , , and . IWBF, page 1-6. IEEE, (2014)Steganography in Streaming Multimedia over Networks., , and . Trans. Data Hiding and Multimedia Security, (2012)Anti-Forensics of Double JPEG Compression Detection., and . IWDW, volume 7128 of Lecture Notes in Computer Science, page 411-424. Springer, (2011)