Author of the publication

Watermarking and encryption of color images in the Fibonacci domain.

, , , , and . Image Processing: Algorithms and Systems, volume 6812 of SPIE Proceedings, page 68121. SPIE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hand tracking and trajectory analysis for physical rehabilitation., , , , and . MMSP, page 1-6. IEEE, (2009)JPEG compression anti-forensics based on first significant digit distribution., and . MMSP, page 500-505. IEEE, (2013)A Benford-Fourier JPEG compression detector., , and . ICIP, page 5322-5326. IEEE, (2014)Supervised models for multimodal image retrieval based on visual, semantic and geographic information., , , and . CBMI, page 1-5. IEEE, (2012)3D-Model-Based Video Analysis for Computer Generated Faces Identification., , and . IEEE Trans. Information Forensics and Security, 10 (8): 1752-1763 (2015)An improved asymmetric watermarking scheme suitable for copy protection., , and . IEEE Trans. Signal Processing, 54 (7): 2833-2834 (2006)EventMask: A Game-Based Framework for Event-Saliency Identification in Images., , and . IEEE Trans. Multimedia, 17 (8): 1359-1371 (2015)A New Sequential Multiple Watermarking Scheme., , and . ICIP, page 1369-1372. IEEE, (2006)Detecting photo manipulation on signs and billboards., , and . ICIP, page 1741-1744. IEEE, (2010)Exploiting DCT masking effect to improve the perceptual quality of data hiding., , , and . Image Processing: Algorithms and Systems, volume 7532 of SPIE Proceedings, page 75320. SPIE, (2010)