Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust message authentication code algorithm for digital audio recordings., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 650508. SPIE, (2007)Advanced audio watermarking benchmarking., , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 224-235. SPIE, (2004)Evaluation of robustness and transparency of multiple audio watermark embedding., and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 68190Z. SPIE, (2008)Watermark-Based Authentication and Key Exchange in Teleconferencing Systems., , , and . Communications and Multimedia Security, volume 6109 of Lecture Notes in Computer Science, page 75-80. Springer, (2010)Zero false positive 2-secure fingerprinting watermarking based on combining hamming distance conditions and parent pair search., , , and . MM&Sec, page 169-174. ACM, (2010)Audio watermarking and partial encryption., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 779-788. SPIE, (2005)Video game watermarking., , , , , , , and . Media Watermarking, Security, and Forensics, volume 8665 of SPIE Proceedings, page 866506. SPIE, (2013)Security of robust audio hashes., , , and . WIFS, page 126-130. IEEE, (2009)Watermark Embedding Using Audio Fingerprinting., , and . Trans. Data Hiding and Multimedia Security, (2012)Collusion-Secure Fingerprint Watermarking for Real World Applications., , , , , and . Sicherheit, volume P-170 of LNI, page 129-140. GI, (2010)