“Robustness Improvement of Known-Host-State Watermarking Using Host Statistics”, Signal Processing, vol. 86, pp. 1076-1088, 2006.
, “Quantization-Based Methods: Additive Attacks Performance Analysis”, Transactions on Data Hiding and Multimedia Security III, vol. 4920, pp. 70-90, 2008.
, “Worst case additive attack against quantization-based watermarking techniques”, in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 135-138.
, “Worst case additive attack against quantization-based data-hiding methods”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, “Spread Spectrum Watermarking for Real Images: Is Everything So Hopeless?”, in European Signal Processing Conference (EUSIPCO), Vienna, Austria, 2004.
, “Robustness Improvement of Known-Host-State Watermarking Using Host Statistics”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, “On reversibility of random binning techniques: multimedia perspectives”, in Conference on Communications and Multimedia Security (CMS), Salzburg, Austria, 2005. cms05.pdf (267.92 KB)
, “Quantization-based watermarking performance improvement using host statistics: additive noise attack”, in ACM Workshop on Multimedia and Security (MMSEC), Magdeburg, Germany, 2004.
,