Wadih Sawaya

According to our database1, Wadih Sawaya authored at least 17 papers between 2003 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Natural Steganography in JPEG Domain With a Linear Development Pipeline.
IEEE Trans. Inf. Forensics Secur., 2021

2020
JPEG Steganography and Synchronization of DCT Coefficients for a Given Development Pipeline.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

2019
A Natural Steganography Embedding Scheme Dedicated to Color Sensors in the JPEG Domain.
Proceedings of the Media Watermarking, 2019

Computing Dependencies between DCT Coefficients for Natural Steganography in JPEG Domain.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

2018
An Empirical Study of Steganography and Steganalysis of Color Images in the JPEG Domain.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

2016
Rare event probability estimation using information projection.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

2014
Critères BIC et AIC pour les chaînes de Markov cachées. Application aux communications numériques.
Traitement du Signal, 2014

Document authentication using graphical codes: reliable performance analysis and channel optimization.
EURASIP J. Inf. Secur., 2014

Double Markov Process blind estimation: Application to communication in a long memory channel.
Digit. Signal Process., 2014

Image model and printed document authentication: A theoretical analysis.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Authentication using graphical codes: Optimisation of the print and scan channels.
Proceedings of the 22nd European Signal Processing Conference, 2014

2013
Document authentication using graphical codes: impacts of the channel model.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

2012
Document Authentication Using 2D Codes: Maximizing the Decoding Performance Using Statistical Inference.
Proceedings of the Communications and Multimedia Security, 2012

2011
EM-Based joint symbol and blur estimation for 2D barcode.
Proceedings of the 7th International Symposium on Image and Signal Processing and Analysis, 2011

2010
Blind Detection of Severely Blurred 1D Barcode.
Proceedings of the Global Communications Conference, 2010

2003
Simulation of DS-CDMA on the LOS multipath 60 GHz channel and performance with RAKE receiver.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

A low complexity suboptimal MIMO receiver: the combined ZF-MLD algorithm.
Proceedings of the IEEE 14th International Symposium on Personal, 2003


  Loading...