University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Author is "Schaathun, H"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 29.

Article

Schaathun, HG (2009) On higher weights and code existence Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5921 L. pp. 56-64.

Škorić, B, Katzenbeisser, S, Schaathun, HG and Celik, MU (2009) Tardos fingerprinting codes in the combined digit model Proceedings of the 2009 1st IEEE International Workshop on Information Forensics and Security, WIFS 2009. pp. 41-45.

Schaathun, HG (2008) Attack analysis for He & Wu's joint atermarking/fingerprinting scheme Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5041 L. pp. 45-59.

Briffa, JA and Schaathun, HG (2008) Improvement of the Davey-MacKay Construction 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3. pp. 234-237.

Schaathun, HG (2008) Novel attacks on spread-spectrum fingerprinting Eurasip Journal on Information Security, 2008.

Schaathun, HG (2008) On error-correcting fingerprinting codes for use with watermarking Multimedia Systems, 13 (5-6). pp. 331-344.

Schaathun, HG (2008) On the assumption of equal contributions in fingerprinting IEEE Transactions on Information Forensics and Security, 3 (3). pp. 569-572.

Schaathun, HG (2008) A key-recovery attack on authentication watermarking by Li and Yuan MM and Sec'08: Proceedings of the 10th ACM Workshop on Multimedia and Security. pp. 221-225.

Schaathun, HG and Fernandez, M (2006) Soft decision decoding of Boneh-Shaw fingerprinting codes IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E89-A (10). pp. 2603-2608.

Schaathun, HG (2006) The Boneh-Shaw fingerprinting scheme is better than we thought IEEE Transactions on Information Forensics and Security, 1 (2). pp. 248-255.

Schaathun, Hans Georg (2006) On Watermarking/Fingerprinting for Copyright Protection Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC '06). pp. 50-53.

Schaathun, Hans (2005) The second support weight distribution of the Kasami codes IEEE Transactions on Information Theory, 51 (8).

Helleseth, Tor and Schaathun, Hans (2004) On the (2-1) Separating Weight of the Kerdock Code IEEE Transactions on Information Theory, 50 (12). pp. 3312-3315.

Helleseth, Tor and Schaathun, Hans Georg (2004) On the (2,1)-Separating Weight of the Kerdock Code IEEE Transactions on Information Theory, 50 (12). pp. 3312-3315.

Schaathun, Hans Georg (2004) Fighting Three Pirates with Scattering Codes Proceedings of the International Symposium on Information Theory 2004.

Cohen, Gerard D. and Schaathun, H. (2004) Upper bounds on separating codes IEEE Transactions on Information Theory, 50 (5).

Schaathun, Hans Georg (2004) Duality and Support Weight Distributions IEEE Transactions on Information Theory, 50 (5). pp. 862-867.

Cohen, Gerard, Encheva, S. and Schaathun, Hans (2002) More on (2,2)-separating systems IEEE Transactions on Information Theory, 48 (9).

Schaathun, Hans Georg (2000) The Weight Hierarchy of Product Codes IEEE Transactions on Information Theory, 46 (7). pp. 2648-2651.

Conference or Workshop Item

Briffa, JA, Schaathun, HG and Wesemeyer, S (2010) An Improved Decoding Algorithm for the Davey-MacKay Construction In: IEEE International Conference on Communications (ICC), 2010, 2010-05-23 - 2010-05-27, Cape Town.

Briffa, JA, Schaathun, H and Wahab, AWA (2009) Has F5 Really Been Broken? In: 3rd International Conference on Crime Detection and Prevention (ICDP 2009), 2009-12-03 - 2009-12-03, London.

Wahab, AWA, Briffa, JA, Schaathun, HG and Ho, Anthony (2009) Conditional Probability Based Steganalysis for JPEG Steganography In: International Conference on Signal Processing Systems 2009, 15 - 17 May 2009, Singapore.

Briffa, JA and Schaathun, HG (2008) Non-Binary Turbo Codes and Applications

Schaathun, HG and Cohen, GD (2006) Nested codes for constrained memory and for dirty paper

Schaathun, Hans Georg and Fernandez, Marcel (2005) Boneh-Shaw Fingerprinting and Soft Decision Decoding In: IEEE Information Theory Workshop, 2005..

Cohen, Gerard and Schaathun, Hans Georg (2003) New upper bounds on separating codes In: 10th International Conference on Telecommunications, 2003. ICT 2003..

Schaathun, Hans Georg (2001) A Lower Bound on the Greedy Weights of Product Codes and Projective Multisets

Schaathun, Hans Georg (2000) Projective systems and higher weights In: 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).

Wahab, AWA, Briffa, JA and Schaathun, HG On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography In: Digital Watermarking7th International Workshop, IWDW 2008, 2008-11-10 - 2008-11-12, Busan, Korea.

This list was generated on Sun Sep 24 21:30:02 2017 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800