Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Introduction of New Associate Editors., , , , , , , , , and 23 other author(s). IEEE Trans. Circuits Syst. Video Techn., 26 (2): 253-263 (2016)On Reversibility of Random Binning Techniques: Multimedia Perspectives., , , , , and . Communications and Multimedia Security, volume 3677 of Lecture Notes in Computer Science, page 108-118. Springer, (2005)Optimal counterforensics for histogram-based forensics., and . ICASSP, page 3048-3052. IEEE, (2013)Transportation-theoretic image counterforensics to First Significant Digit histogram forensics., , , and . ICASSP, page 2699-2703. IEEE, (2014)Flat fading channel estimation based on Dirty Paper Coding., , and . ICASSP, page 6479-6483. IEEE, (2014)A new look at ML step-size estimation for Scalar Costa scheme data hiding., , and . ICIP, page 4211-4215. IEEE, (2014)V-DIFT: Vector-Based Dynamic Information Flow Tracking with Application to Locating Cryptographic Keys for Reverse Engineering., , , and . ARES, page 266-271. IEEE Computer Society, (2016)Fast sequential forensic detection of camera fingerprint., , , and . ICIP, page 3902-3906. IEEE, (2016)On the effectiveness of meta-detection for countering oracle attacks in watermarking., , , and . WIFS, page 1-6. IEEE, (2015)Random Matrix Theory for Modeling the Eigenvalue Distribution of Images Under Upscaling., , and . TIWDC, volume 766 of Communications in Computer and Information Science, page 109-124. Springer, (2017)