Export 129 results:
Author [ Title
Filters: First Letter Of Last Name is C [Clear All Filters]
“Are you threatening me? Towards smart detectors in watermarking”, in Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2014.
spie14_2.0.pdf (430.73 KB)
, 
“Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
spie05_dpc.pdf (165.56 KB)
, 
“Adjacent Beams Resource Sharing to Serve Hot Spots : A Rate Splitting Approach”, in 36th International Communications Satellite Systems Conference (ICSSC), Niagara Falls, Canada, 2018.
ADJACENT_BEAMS_RESOURCE_SHARING_TO_SERVE_HOT_SPOTS_A_RATE_SPLITTING_APPROACH.pdf (756.71 KB)
, 
“Adam and the Ants: On the Influence of the Optimization Algorithm on the Detectability of DNN Watermarks”, vol. 22, no. 12, p. 36, 2020.
,