Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

StirMark Benchmark: Audio Watermarking Attacks., , , , , , , and . ITCC, page 49-54. IEEE Computer Society, (2001)Semi-Fragile Watermarking for Image Authentication with High Tampering Localization Capability., and . AXMEDIS, page 143-152. IEEE Computer Society, (2006)Complementing DRM with digital watermarking: mark, search, retrieve., , and . Online Information Review, 31 (1): 10-21 (2007)An Efficient Intrinsic Authorship Verification Scheme Based on Ensemble Learning., and . ARES, page 571-578. IEEE Computer Society, (2014)A new method for image reconstruction using self-embedding., , , and . ICASSP, page 7430-7434. IEEE, (2014)Digital Watermarking for Image Authentication with Localization., and . ICIP, page 1973-1976. IEEE, (2006)Audio Integrity Protection and Falsification Estimation by Embedding Multiple Watermarks., , and . IIH-MSP, page 469-472. IEEE Computer Society, (2006)Advanced audio watermarking benchmarking., , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 224-235. SPIE, (2004)ForBild: efficient robust image hashing., , and . Media Watermarking, Security, and Forensics, volume 8303 of SPIE Proceedings, page 83030O. SPIE, (2012)Ranking search for probabilistic fingerprinting codes., , and . Media Watermarking, Security, and Forensics, volume 8303 of SPIE Proceedings, page 830306. SPIE, (2012)