Author of the publication

Inpainting attacks against visible watermarking schemes.

, and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 376-384. SPIE, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacking visible watermarking schemes., and . IEEE Trans. Multimedia, 6 (1): 16-30 (2004)A novel two-stage algorithm for DCT and IDCT., , and . IEEE Trans. Signal Processing, 40 (6): 1610-1612 (1992)Unseen Visible Watermarking., , and . ICIP (3), page 261-264. IEEE, (2007)Insider Collusion Attack on Privacy-Preserving Kernel-Based Data Mining Systems., , , and . IEEE Access, (2016)Efficient algorithm for scene change detection and camera motion characterization using the approach of heterogeneous video transcoding on MPEG compressed videos., and . Storage and Retrieval for Media Databases, volume 4676 of SPIE Proceedings, page 168-176. SPIE, (2002)Encoding strategies for realizing MPEG-4 universal scalable video coding., , , , and . VCIP, volume 5150 of Proceedings of SPIE, page 903-913. SPIE, (2003)A Colorization Based Animation Broadcast System with Traitor Tracing Capability., , , and . IWDW, volume 4283 of Lecture Notes in Computer Science, page 387-396. Springer, (2006)Movie Analysis Based on Roles' Social Network., , and . ICME, page 1403-1406. IEEE Computer Society, (2007)Fidelity-Controlled Robustness Enhancement of Blind Watermarking Schemes Using Evolutionary Computational Techniques., , and . IWDW, volume 3304 of Lecture Notes in Computer Science, page 271-282. Springer, (2004)Image Descriptor Based Digital Semi-blind Watermarking for DIBR 3D Images., , and . IWDW, volume 9023 of Lecture Notes in Computer Science, page 90-104. Springer, (2014)