Author of the publication

Joint detection of full-frame linear filtering and JPEG compression in digital images.

, , and . WIFS, page 156-161. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal strategies for spread-spectrum and quantized-projection image data hiding games with BER payoffs., , and . ICIP (2), page 479-482. (2003)Quantized projection data hiding., and . ICIP (2), page 889-892. (2002)Dither-modulation data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks., , and . ICIP (2), page 503-506. (2003)Rational dither modulation: a novel data-hiding method robust to value-metric scaling attacks., , , and . MMSP, page 139-142. IEEE, (2004)A new look at ML step-size estimation for Scalar Costa scheme data hiding., , and . ICIP, page 4211-4215. IEEE, (2014)Improving data hiding performance by using quantization in a projected domain., and . ICME (1), page 565-568. IEEE Computer Society, (2002)A Least Squares approach to user profiling in pool mix-based anonymous communication systems., and . WIFS, page 115-120. IEEE, (2012)Security of Lattice-Based Data Hiding Against the Known Message Attack., , , and . IEEE Trans. Information Forensics and Security, 1 (4): 421-439 (2006)Fully Private Noninteractive Face Verification., , and . IEEE Trans. Information Forensics and Security, 8 (7): 1101-1114 (2013)Algebraic solution to the robust SPR problem for two polynomials., and . Automatica, 37 (5): 757-762 (2001)