| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
IEEE Access
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2024 | J | jnl |
IEEE Access
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
IEEE Access
|
| 2022 | J | jnl |
IEEE Access
|
| 2022 | — | conf |
CSCI
|
| 2022 | J | jnl |
IEEE Access
|
| 2021 | J | jnl |
CoRR
|
| 2019 | J | jnl |
Int. J. Inf. Sec.
|
| 2018 | — | conf |
CISP-BMEI
|
| 2016 | J | jnl |
Comput. Secur.
|
| 2015 | J | jnl |
Eng. Appl. Artif. Intell.
|
| 2015 | B | conf |
SMC
|
| 2013 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2011 | J | jnl |
Integr. Comput. Aided Eng.
|
| 2010 | J | jnl |
Pattern Recognit.
|
| 2007 | — | conf |
SIBGRAPI
|
| 2007 | C | conf |
PSIVT
|
| 2007 | — | conf |
ISMM (2)
|
| 2007 | — | conf |
ISMM (2)
|
| 2006 | A | conf |
ICME
|
| 2005 | — | conf |
A new public-key authentication watermarking for binary document images resistant to parity attacks.
ICIP (2)
|
| 2005 | — | conf |
ICIP (3)
|
| 2005 | C | conf |
IWDW
|
| 2005 | — | conf |
SIBGRAPI
|
| 2005 | J | jnl |
Comput. Vis. Image Underst.
|
| 2005 | — | conf |
ICIP (2)
|
| 2004 | B | conf |
ICIP
|
| 2004 | J | jnl |
Int. J. Imaging Syst. Technol.
|
| 2004 | C | conf |
IWDW
|
| 2004 | J | jnl |
IEEE Trans. Image Process.
|
| 2004 | B | conf |
ICIP
|
| 2003 | — | conf |
ICIP (2)
|
| 2003 | J | jnl |
RITA
|
| 2003 | — | conf |
SIBGRAPI
|
| 2002 | A* | conf |
CRYPTO
|
| 2002 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2002 | — | conf |
ICIP (2)
|
| 2002 | — | conf |
SIBGRAPI
|
| 2001 | — | conf |
ICIP (2)
|
| 2001 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2001 | A* | conf |
FSE
|
| 2001 | — | conf |
ICIP (2)
|
| 2000 | J | jnl |
Int. J. Imaging Syst. Technol.
|
| 2000 | B | conf |
ICIP
|
| 1999 | — | conf |
SIBGRAPI
|
| 1999 | — | conf |
SIBGRAPI
|
| 1998 | — | conf |
ICIP (2)
|