Author of the publication

Reliable Provenance Information for Multimedia Data Using Invertible Fragile Watermarks.

, , , , and . BNCOD, volume 7051 of Lecture Notes in Computer Science, page 3-17. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Program Slicing in the Presence of Preprocessor Variability., and . ICSME, page 501-505. IEEE Computer Society, (2014)Database-Centric Chain-of-Custody in Biometric Forensic Systems., , and . BIOID, volume 6583 of Lecture Notes in Computer Science, page 250-261. Springer, (2011)A Context-Aware Recommender System for Extended Software Product Line Configurations., , , , and . VaMoS, page 97-104. ACM, (2018)Reverse engineering variability from requirement documents based on probabilistic relevance and word embedding., , and . SPLC, page 121-131. ACM, (2018)Code clones in feature-oriented software product lines., , and . GPCE, page 103-112. ACM, (2010)Code Smells Revisited: A Variability Perspective., and . VaMoS, page 3. ACM, (2015)QuEval: Beyond high-dimensional indexing a la carte., , , , , and . PVLDB, 6 (14): 1654-1665 (2013)Incremental Co-Evolution of Java Programs based on Bidirectional Graph Transformation., , , and . PPPJ, page 138-151. ACM, (2015)Interface variability in family model mining., , , and . SPLC Workshops, page 44-51. ACM, (2013)Implementing refactorings for FOP: lessons learned and challenges ahead., , and . FOSD, page 33-40. ACM, (2013)