Author of the publication

Profiles for evaluation: the usage of audio WET.

, and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60721J. SPIE, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Profiles for evaluation: the usage of audio WET., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60721J. SPIE, (2006)Application-oriented audio watermark benchmark service., , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 275-286. SPIE, (2005)Digital watermarking of biometric speech references: impact to the EER system performance., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 650513. SPIE, (2007)Theoretical Framework for a Practical Evaluation and Comparison of Audio Watermarking Schemes in the Triangle of Robustness, Transparency and Capacity., , , and . (2006)Digital audio watermarking evaluation within the application field of perceptual hashing., and . SAC, page 1192-1196. ACM, (2008)Generating Shifting Workloads to Benchmark Adaptability in Relational Database Systems., , , , and . TPCTC, volume 5895 of Lecture Notes in Computer Science, page 116-131. Springer, (2009)Future Perspectives: The Car and Its IP-Address - A Potential Safety and Security Risk Assessment., , , and . SAFECOMP, volume 4680 of Lecture Notes in Computer Science, page 40-53. Springer, (2007)Veranstaltungsbesprechungen., , , , , , and . Datenschutz und Datensicherheit, 30 (4): 258-259 (2006)Network Based Intrusion Detection to Detect Steganographic Communication Channels - On the Example of Images., , and . EUROMICRO, page 453-456. IEEE Computer Society, (2004)Transparency benchmarking on audio watermarks and steganography., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60721L. SPIE, (2006)