default search action
Adnan M. Alattar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [e14]Adnan M. Alattar, Nasir D. Memon, Gaurav Sharma:
Media Watermarking, Security, and Forensics 2022, online, January 15-26, 2022. Society for Imaging Science and Technology 2022 [contents] - 2021
- [e13]Adnan M. Alattar, Nasir D. Memon, Gaurav Sharma:
Media Watermarking, Security, and Forensics, Virtual Event, January 2021. Society for Imaging Science and Technology 2021 [contents] - 2020
- [e12]Adnan M. Alattar, Nasir D. Memon, Gaurav Sharma:
Media Watermarking, Security, and Forensics 2020, Burlingame, CA, USA, 26-30 January 2020. Society for Imaging Science and Technology 2020 [contents]
2010 – 2019
- 2019
- [e11]Adnan M. Alattar, Nasir D. Memon, Gaurav Sharma:
Media Watermarking, Security, and Forensics 2019, Burlingame, CA, USA, 13-17 January 2019. Society for Imaging Science and Technology 2019 [contents] - 2018
- [e10]Adnan M. Alattar, Nasir D. Memon, Gaurav Sharma:
Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018 - 1 February 2018. Society for Imaging Science and Technology 2018 [contents] - 2017
- [e9]Adnan M. Alattar, Nasir D. Memon:
Media Watermarking, Security, and Forensics 2017, Burlingame, CA, USA, 29 January 2017 - 2 February 2017. Society for Imaging Science and Technology 2017 [contents] - 2016
- [e8]Adnan M. Alattar, Nasir D. Memon:
Media Watermarking, Security, and Forensics 2016, San Francisco, California, USA, February 14-18, 2016. Society for Imaging Science and Technology 2016 [contents] - 2015
- [c20]Rebecca Gerlach, Dan Pinard, Matt Weaver, Adnan M. Alattar:
Scanning-time evaluation of Digimarc Barcode. Media Watermarking, Security, and Forensics 2015: 940907 - [c19]Eliot Rogers, Tony Rodriguez, John D. Lord, Adnan M. Alattar:
Digimarc Discover on Google Glass. Media Watermarking, Security, and Forensics 2015: 940908 - [e7]Adnan M. Alattar, Jessica J. Fridrich, Ned M. Smith, Pedro Comesaña Alfaro:
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2015, Portland, OR, USA, June 17 - 19, 2015. ACM 2015, ISBN 978-1-4503-3587-4 [contents] - [e6]Adnan M. Alattar, Nasir D. Memon, Chad Heitzenrater:
Media Watermarking, Security, and Forensics 2015, San Francisco, CA, USA, February 9-11, 2015, Proceedings. SPIE Proceedings 9409, SPIE 2015, ISBN 978-1-6284-1499-8 [contents] - 2014
- [e5]Adnan M. Alattar, Nasir D. Memon, Chad Heitzenrater:
Media Watermarking, Security, and Forensics 2014, San Francisco, CA, USA, February 2, 2014, Proceedings. SPIE Proceedings 9028, SPIE 2014, ISBN 978-0-8194-9945-5 [contents] - 2013
- [e4]Adnan M. Alattar, Nasir D. Memon, Chad Heitzenrater:
Media Watermarking, Security, and Forensics 2013, Burlingame, CA, USA, February 5-7, 2013, Proceedings. SPIE Proceedings 8665, SPIE 2013, ISBN 978-0-8194-9438-2 [contents] - 2012
- [e3]Nasir D. Memon, Adnan M. Alattar, Edward J. Delp III:
Media Watermarking, Security, and Forensics 2012, Burlingame, CA, USA, January 22, 2012, Proceedings. SPIE Proceedings 8303, SPIE 2012, ISBN 978-0-8194-8950-0 [contents] - 2011
- [e2]Nasir D. Memon, Jana Dittmann, Adnan M. Alattar, Edward J. Delp III:
Media Watermarking, Security, and Forensics III, San Francisco Airport, CA, USA, January 24-26, 2011, Proceedings. SPIE Proceedings 7880, SPIE 2011, ISBN 978-0-8194-8417-8 [contents] - 2010
- [e1]Nasir D. Memon, Jana Dittmann, Adnan M. Alattar, Edward J. Delp:
Media Forensics and Security II, part of the IS&T-SPIE Electronic Imaging Symposium, San Jose, CA, USA, January 18-20, 2010, Proceedings. SPIE Proceedings 7541, SPIE 2010, ISBN 978-0-8194-7934-1 [contents]
2000 – 2009
- 2006
- [c18]Adnan M. Alattar, Osama M. Alattar:
Reducing the processing time of the hierarchical watermark detector when applied to unmarked images. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60721S - 2005
- [c17]Osama M. Alattar, Adnan M. Alattar:
A fast hierarchical watermark detector for real-time software or low-cost hardware implementation. ICIP (1) 2005: 973-976 - [c16]Brett A. Bradley, Adnan M. Alattar:
High-capacity invertible data-hiding algorithm for digital audio. Security, Steganography, and Watermarking of Multimedia Contents 2005: 789- - 2004
- [j2]Adnan M. Alattar:
Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. Image Process. 13(8): 1147-1156 (2004) - [c15]Adnan M. Alattar:
Reversible watermark using difference expansion of quads. ICASSP (3) 2004: 377-380 - [c14]John Stach, Adnan M. Alattar:
A high-capacity invertible data-hiding algorithm using a generalized reversible integer transform. Security, Steganography, and Watermarking of Multimedia Contents 2004: 386-396 - [c13]Adnan M. Alattar, Osama M. Alattar:
Watermarking electronic text documents containing justified paragraphs and irregular line spacing. Security, Steganography, and Watermarking of Multimedia Contents 2004: 685-695 - 2003
- [j1]Adnan M. Alattar, Eugene T. Lin, Mehmet Utku Celik:
Digital watermarking of low bit-rate advanced simple profile MPEG-4 compressed video. IEEE Trans. Circuits Syst. Video Technol. 13(8): 787-800 (2003) - [c12]Adnan M. Alattar, Eugene T. Lin, Mehmet Utku Celik:
Watermarking low bit-rate Advanced Simple Profile MPEG-4 bitstreams. ICASSP (3) 2003: 513-516 - [c11]Adnan M. Alattar:
Reversible watermark using difference expansion of triplets. ICIP (1) 2003: 501-504 - [c10]Adnan M. Alattar, Joel Meyer:
Watermark re-synchronization using log-polar mapping of image autocorrelation. ISCAS (2) 2003: 928-931 - [c9]Adnan M. Alattar, Mehmet Utku Celik, Eugene T. Lin:
Evaluation of watermarking low-bit-rate MPEG-4 bit streams. Security and Watermarking of Multimedia Contents 2003: 440-451 - 2000
- [c8]Adnan M. Alattar:
Smart Images using Digimarc's watermarking technology. Security and Watermarking of Multimedia Contents 2000: 264-273
1990 – 1999
- 1999
- [c7]Adnan M. Alattar, Sarah A. Rajala:
Facial features localization in front view head and shoulders images. ICASSP 1999: 3557-3560 - [c6]Adnan M. Alattar, Ghassan Al-Regib, Saud Al-Semari:
Improved Selective Encryption Techniques for Secure Transmission of Mpeg Video Bit-Streams. ICIP (4) 1999: 256-260 - [c5]Adnan M. Alattar, Sarah A. Rajala:
Estimating head's measurements from front-view head and shoulders images. ISCAS (4) 1999: 114-117 - [c4]Adnan M. Alattar, Ghassan Al-Regib:
Evaluation of selective encryption techniques for secure transmission of MPEG-compressed bit-streams. ISCAS (4) 1999: 340-343 - 1997
- [c3]Adnan M. Alattar:
Detecting fade regions in uncompressed video sequences. ICASSP 1997: 3025-3028 - 1993
- [c2]Adnan M. Alattar:
Detecting and compressing dissolve regions in video sequences with a DVI multimedia image compression algorithm. ISCAS 1993: 13-16
1980 – 1989
- 1989
- [c1]Adnan M. Alattar, Sarah A. Rajala:
Primitive-based teleconference image coding technique. ICASSP 1989: 1933-1936
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint