| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2008 | J | jnl |
CoRR
|
| 2008 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2007 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2007 | — | conf |
Security, Steganography, and Watermarking of Multimedia Contents
|
| 2007 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2007 | J | jnl |
CoRR
|
| 2006 | B | conf |
ISIT
|
| 2006 | — | — |
|
| 2006 | — | conf |
ICASSP (2)
|
| 2006 | — | conf |
Security, Steganography, and Watermarking of Multimedia Contents
|
| 2005 | C | conf |
IWDW
|
| 2005 | — | conf |
Security, Steganography, and Watermarking of Multimedia Contents
|
| 2004 | J | jnl |
CoRR
|
| 2004 | B | conf |
ITW
|
| 2004 | — | conf |
Security, Steganography, and Watermarking of Multimedia Contents
|