Author of the publication

An analysis of quantization based embedding-detection techniques.

, , and . ICASSP (3), page 77-80. IEEE, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PSteg: steganographic embedding through patching., , , and . ICASSP (2), page 537-540. IEEE, (2005)Preprocessing tool for compressed video editing., and . MMSP, page 283-288. IEEE, (1999)Efficient Sensor Fingerprint Matching Through Fingerprint Binarization., , and . IEEE Trans. Information Forensics and Security, 7 (4): 1404-1413 (2012)Recent advances in counter PRNU based source attribution and beyond., , , and . Media Watermarking, Security, and Forensics, volume 9409 of SPIE Proceedings, page 94090N. SPIE, (2015)Analysis of Seam-Carving-Based Anonymization of Images Against PRNU Noise Pattern-Based Source Attribution., , and . IEEE Trans. Information Forensics and Security, 9 (12): 2277-2290 (2014)An analysis of quantization based embedding-detection techniques., , and . ICASSP (3), page 77-80. IEEE, (2004)Benchmarking steganographic and steganalysis techniques., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 252-263. SPIE, (2005)A preliminary examination technique for audio evidence to distinguish speech from non-speech using objective speech quality measures., and . Speech Communication, (2014)An overview of scalar quantization based data hiding methods., , and . Signal Processing, 86 (5): 893-914 (2006)Improved utilization of embedding distortion in scalar quantization based data hiding techniques., , , and . Signal Processing, 87 (5): 877-890 (2007)