Author of the publication

Ranking search for probabilistic fingerprinting codes.

, , and . Media Watermarking, Security, and Forensics, volume 8303 of SPIE Proceedings, page 830306. SPIE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Watermarking textures in video games., , , , and . Media Watermarking, Security, and Forensics, volume 9028 of SPIE Proceedings, page 90280G. SPIE, (2014)A Novel Attack Model for Collusion Secure Fingerprinting Codes., , , , and . Media Watermarking, Security, and Forensics, page 1-11. Ingenta, (2016)MP3 Partial Encryption for DRM., and . Media Watermarking, Security, and Forensics, page 28-35. Ingenta, (2017)Universal Threshold Calculation for Fingerprinting Decoders using Mixture Models., , , and . IH&MMSec, page 109-114. ACM, (2015)Rebound on Symmetric Tardos Codes., and . IIH-MSP, page 486-489. IEEE, (2012)Leakage detection and tracing for databases., , and . IH&MMSec, page 29-34. ACM, (2013)3D watermarking in the context of video games., , , and . MMSP, page 418-423. IEEE, (2013)Quality Metric for 2D Textures on 3D Objects., , , and . Media Watermarking, Security, and Forensics, page 1-6. Ingenta, (2016)Ranking search for probabilistic fingerprinting codes., , and . Media Watermarking, Security, and Forensics, volume 8303 of SPIE Proceedings, page 830306. SPIE, (2012)Zero false positive 2-secure fingerprinting watermarking based on combining hamming distance conditions and parent pair search., , , and . MM&Sec, page 169-174. ACM, (2010)