Author of the publication

On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography.

, , and . IWDW, volume 5450 of Lecture Notes in Computer Science, page 342-349. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the (2, 1)-separating weight of the Kerdock code., and . IEEE Trans. Information Theory, 50 (12): 3312-3315 (2004)A Lower Bound on the Greedy Weights of Product Codes.. Des. Codes Cryptogr., 31 (1): 27-42 (2004)Novel Attacks on Spread-Spectrum Fingerprinting.. EURASIP J. Information Security, (2008)Separating and Intersecting Properties of BCH and Kasami Codes., and . IMA Int. Conf., volume 2898 of Lecture Notes in Computer Science, page 52-65. Springer, (2003)Hierarchical Task Analysis, Situation-Awareness And Support Software., , , and . ECMS, page 184-190. European Council for Modeling and Simulation, (2013)Attacks on Kuribayashi's Fingerprinting Scheme.. IEEE Trans. Information Forensics and Security, 9 (4): 607-609 (2014)More on (2,2)-separating systems., , and . IEEE Trans. Information Theory, 48 (9): 2606-2609 (2002)Upper Bounds on Separating Codes., and . IEEE Trans. Information Theory, 50 (6): 1291-1295 (2004)Forord til NIK 2015.. NIK, Bibsys Open Journal Systems, Norway, (2015)Intelligent Computer-Automated Crane Design Using An Online Crane Prototyping Tool., , , , and . ECMS, page 564-573. European Council for Modeling and Simulation, (2016)