Table of Contents
He is also a co-author of a research monograph with H. Sencar and M. Ilya Pollak received the B. His research interests are in signal and image processing and financial engineering. Site by Conference Management Services, Inc.
Support: webmaster icassp Akansu, Ilya Pollak Abstract The recent advances in high performance computing and DSP along with low latency networking and storage technologies have transformed the financial industry, and greatly increased its use of signal processing and engineering methods. Speaker Biography Ali N. Akansu Ali N. Ilya Pollak Ilya Pollak received the B.
A fragile ROI-based medical image watermarking technique with tamper detection and recovery.
Multimedia and content sharing. Discovering Computers.
Communication with side information and data hiding. Data hiding fundamentals and applications: content security in digital media. Increasing image compression rate using steganography. Expert Syst Appl ;40 17 AES based steganography.
- Josephine Baker and the Rainbow Tribe.
- Bioelectrochemistry : fundamentals, applications and recent developments;
- How do you identify third-party script on a page?.
- tynyxofuje.cf: Ali-A - Web Development & Design / Computers & Internet: Books;
- Data Hiding Fundamentals and Applications - 1st Edition!
Nilesh R, Ganga H. Int J Comutp Trends Technol ;12 2 A fragile watermarking algorithm for content authentication.
Int J Comput Inform Sci ;2 1 Steganography using genetic encryption along with visual cryptography. A high quality image sharing with steganography and adaptive authentication scheme. J Syst Softw ;84 12 Handbook Stat ; Reversible watermarking for image integrity verification in hierarchical PACS. Das S, Kundu MK. Effective management of medical information through ROI-lossless fragile image watermarking technique.
Comput Methods Programs Biomed ; 3 Viswanathan P, Krishna PV. A joint FED watermarking system using spatial fusion for verifying the security issues of teleradiology. An overview of image steganography. Moerland T. Steganography and steganalysis. Leiden Institute of Advanced Computing Science.naenergysolutionsgh.com/images
Akansu, Ali N. 1958-
High-performance JPEG steganography using complementary embedding strategy. Pattern Recognit ;41 9 YASS: Yet another steganographic scheme that resists blind steganalysis. Springer, Berlin, Heidelberg.
- Item Preview.
- Data Hiding Fundamentals and Applications;
- Akansu, Ali N. [WorldCat Identities].
- The City!
- New Challenges in Superconductivity: Experimental Advances and Emerging Theories: Proceedings of the NATO Advanced Research Workshop, held in Miami, Florida, ... January 2004: 183 (Nato Science Series II:).
Sajedi H, Jamzad M. Adaptive steganography method based on contourlet transform. In Signal Processing, ICSP InIntelligent Control and Innovative Computing pp.