The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mehmet Utku Celik: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mehmet Utku Celik, Gaurav Sharma, Eli Saber, A. Murat Tekalp
    A hierarchical image authentication watermark with improved localization and security. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2001, pp:502-505 [Conf]
  2. Mehmet Utku Celik, Gaurav Sharma, Eli Saber, A. Murat Tekalp
    Reversible data hiding. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2002, pp:157-160 [Conf]
  3. Mehmet Utku Celik, Gaurav Sharma, A. Murat Tekalp
    Collusion-resilient fingerprinting using random prewarping. [Citation Graph (0, 0)][DBLP]
    ICIP (1), 2003, pp:509-512 [Conf]
  4. Oktay Altun, Gaurav Sharma, Mehmet Utku Celik, Mark F. Bocko
    Semifragile hierarchical watermarking in a set theoretic framework. [Citation Graph (0, 0)][DBLP]
    ICIP (1), 2005, pp:1001-1004 [Conf]
  5. Gaurav Sharma, Wencheng Wu, Edul N. Dalal, Mehmet Utku Celik
    Mathematical Discontinuities in CIEDE2000 Color Difference Computations. [Citation Graph (0, 0)][DBLP]
    Color Imaging Conference, 2004, pp:334-339 [Conf]
  6. Aweke N. Lemma, Stefan Katzenbeisser, Mehmet Utku Celik, Michiel van der Veen
    Secure Watermark Embedding Through Partial Encryption. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:433-445 [Conf]
  7. Mehmet Utku Celik, Gaurav Sharma, A. Murat Tekalp
    Level-Successive Encoding for Digital Photography. [Citation Graph (0, 0)][DBLP]
    PICS, 2003, pp:330-334 [Conf]
  8. Mehmet Utku Celik, Gaurav Sharma, A. Murat Tekalp
    Universal image steganalysis using rate-distortion curves. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:467-476 [Conf]
  9. Adnan M. Alattar, Eugene T. Lin, Mehmet Utku Celik
    Digital watermarking of low bit-rate advanced simple profile MPEG-4 compressed video. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2003, v:13, n:8, pp:787-800 [Journal]
  10. Mehmet Utku Celik, Gaurav Sharma, Eli Saber, A. Murat Tekalp
    Hierarchical watermarking for secure image authentication with localization. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2002, v:11, n:6, pp:585-595 [Journal]
  11. Mehmet Utku Celik, Gaurav Sharma, A. Murat Tekalp
    Lossless watermarking for image authentication: a new framework and an implementation. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2006, v:15, n:4, pp:1042-1049 [Journal]
  12. Mehmet Utku Celik, Gaurav Sharma, A. Murat Tekalp, Eli Saber
    Lossless generalized-LSB data embedding. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2005, v:14, n:2, pp:253-266 [Journal]
  13. Juan Ramón Troncoso-Pastoriza, Stefan Katzenbeisser, Mehmet Utku Celik, Aweke N. Lemma
    A secure multidimensional point inclusion protocol. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:109-120 [Conf]
  14. Boris Skoric, T. U. Vladimirova, M. Celik, J. C. Talstra
    Tardos fingerprinting is better than we thought [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  15. Privacy preserving error resilient dna searching through oblivious automata. [Citation Graph (, )][DBLP]


  16. Camcorder Capture Robust Low-Complexity Watermarking of MPEG-2 Bit-Streams. [Citation Graph (, )][DBLP]


  17. Forensic Watermarking During AAC Playback. [Citation Graph (, )][DBLP]


  18. Combining Tardos Fingerprinting Codes and Fingercasting. [Citation Graph (, )][DBLP]


  19. Video fingerprinting for live events. [Citation Graph (, )][DBLP]


  20. Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002