The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Félix Balado: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Pedro Comesaña, Fernando Pérez-González, Félix Balado
    Optimal strategies for spread-spectrum and quantized-projection image data hiding games with BER payoffs. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2003, pp:479-482 [Conf]
  2. Elizabeth P. McCarthy, Félix Balado, Guenole C. M. Silvestre, Neil J. Hurley
    A framework for soft hashing and its application to robust image hashing. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:397-400 [Conf]
  3. Fernando Pérez-González, Félix Balado
    Quantized projection data hiding. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2002, pp:889-892 [Conf]
  4. Fernando Pérez-González, Pedro Comesaña, Félix Balado
    Dither-modulation data hiding with distortion-compensation: exact performance analysis and an improved detector for JPEG attacks. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2003, pp:503-506 [Conf]
  5. Alan J. Larkin, Félix Balado, Neil J. Hurley, Guenole C. M. Silvestre
    Dither Modulation Watermarking of Dynamic Memory Traces. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:372-386 [Conf]
  6. Fernando Pérez-González, Félix Balado
    Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:87-105 [Conf]
  7. Félix Balado
    New Geometric Analysis of Spread-Spectrum Data Hiding with Repetition Coding, with Implications for Side-Informed Schemes. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:336-350 [Conf]
  8. Pedro Comesaña, Fernando Pérez-González, Félix Balado
    Optimal Data-Hiding Strategies for Games with BER Payoffs. [Citation Graph (0, 0)][DBLP]
    IWDW, 2003, pp:101-116 [Conf]
  9. Mark T. Hogan, Félix Balado, Neil J. Hurley, Guenole C. M. Silvestre
    On the Achievable Rate of Side Informed Embedding Techniques with Steganographic Constraints. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:387-402 [Conf]
  10. Kevin M. Whelan, Félix Balado, Guenole C. M. Silvestre, Neil J. Hurley
    Iterative estimation of amplitude scaling on distortion-compensated dither modulation. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:549-560 [Conf]
  11. Félix Balado, Fernando Pérez-González, Pedro Comesaña
    Blind iterative decoding of side-informed data hiding using the expectation-maximization algorithm. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:805-815 [Conf]
  12. Elizabeth P. McCarthy, Félix Balado, Guenole C. M. Silvestre, Neil J. Hurley
    A model for improving the performance of feature-extraction-based robust hashing. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:59-67 [Conf]
  13. Mark T. Hogan, Neil J. Hurley, Guenole C. M. Silvestre, Félix Balado, Kevin M. Whelan
    ML detection of steganography. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:16-27 [Conf]
  14. Fernando Pérez-González, Juan Ramón Hernández, Félix Balado
    Approaching the capacity limit in image watermarking: a perspective on coding techniques for data hiding applications. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2001, v:81, n:6, pp:1215-1238 [Journal]

  15. On the embedding capacity of DNA strands under substitution, insertion, and deletion mutations. [Citation Graph (, )][DBLP]


Search in 0.065secs, Finished in 0.065secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002