default search action
Aweke N. Lemma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2000 – 2009
- 2008
- [j8]Mehmet Utku Celik, Aweke N. Lemma, Stefan Katzenbeisser, Michiel van der Veen:
Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks. IEEE Trans. Inf. Forensics Secur. 3(3): 475-487 (2008) - [j7]Stefan Katzenbeisser, Aweke N. Lemma, Mehmet Utku Celik, Michiel van der Veen, Martijn Maas:
A Buyer-Seller Watermarking Protocol Based on Secure Embedding. IEEE Trans. Inf. Forensics Secur. 3(4): 783-786 (2008) - [c15]Aweke N. Lemma, Stefan Katzenbeisser, Mehmet Utku Celik, Serap Kirbiz:
Forensic watermarking and bit-rate conversion of partially encrypted AAC bitstreams. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 681910 - 2007
- [j6]Serap Kirbiz, Aweke N. Lemma, Mehmet Utku Celik, Stefan Katzenbeisser:
Decode-Time Forensic Watermarking of AAC Bitstreams. IEEE Trans. Inf. Forensics Secur. 2(4): 683-696 (2007) - [c14]Mehmet Utku Celik, Aweke N. Lemma, Stefan Katzenbeisser, Michiel van der Veen:
Secure Embedding of Spread Spectrum Watermarks using Look-up-Tables. ICASSP (2) 2007: 153-156 - [c13]Mehmet Utku Celik, Joop Talstra, Aweke N. Lemma, Stefan Katzenbeisser:
Camcorder Capture Robust Low-Complexity Watermarking of MPEG-2 Bit-Streams. ICIP (5) 2007: 489-492 - [c12]Serap Kirbiz, Mehmet Utku Celik, Aweke N. Lemma, Stefan Katzenbeisser:
Forensic Watermarking During AAC Playback. ICME 2007: 1111-1114 - [c11]Juan Ramón Troncoso-Pastoriza, Stefan Katzenbeisser, Mehmet Utku Celik, Aweke N. Lemma:
A secure multidimensional point inclusion protocol. MM&Sec 2007: 109-120 - [c10]Aweke N. Lemma, Michiel van der Veen:
Deterring watermark collusion attacks using signal processing techniques. Security, Steganography, and Watermarking of Multimedia Contents 2007: 65050M - [p1]Michiel van der Veen, Aweke N. Lemma, Mehmet Utku Celik, Stefan Katzenbeisser:
Forensic Watermarking in Digital Rights Management. Security, Privacy, and Trust in Modern Data Management 2007: 287-302 - 2006
- [c9]Aweke N. Lemma, Stefan Katzenbeisser, Mehmet Utku Celik, Michiel van der Veen:
Secure Watermark Embedding Through Partial Encryption. IWDW 2006: 433-445 - [c8]Aweke N. Lemma, Michiel van der Veen, Mehmet Utku Celik:
New modulation-based watermarking technique for video. Security, Steganography, and Watermarking of Multimedia Contents 2006: 607216 - 2005
- [j5]Michiel van der Veen, Aweke N. Lemma, Ton Kalker:
Electronic content delivery and forensic watermarking. Multim. Syst. 11(2): 174-184 (2005) - 2004
- [c7]Sylvain Beauget, Michiel van der Veen, Aweke N. Lemma:
Informed detection of audio watermark for resolving playback speed modifications. MM&Sec 2004: 117-123 - [c6]Michiel van der Veen, Aweke N. Lemma, Ton Kalker:
Watermarking and fingerprinting for electronic music delivery. Security, Steganography, and Watermarking of Multimedia Contents 2004: 200-211 - 2003
- [j4]Aweke Negash Lemma, Javier Aprea, Werner Oomen, Leon van de Kerkhof:
A temporal domain audio watermarking technique. IEEE Trans. Signal Process. 51(4): 1088-1097 (2003) - [j3]Aweke N. Lemma, Alle-Jan van der Veen, Ed F. Deprettere:
Analysis of joint angle-frequency estimation using ESPRIT. IEEE Trans. Signal Process. 51(5): 1264-1283 (2003) - 2002
- [c5]Michiel van der Veen, Aweke Negash Lemma, Fons Bruekers, Javier Aprea, Ton Kalker:
Security issues in digital audio watermarking. EUSIPCO 2002: 1-4 - 2000
- [c4]Aweke N. Lemma, Alle-Jan van der Veen, Ed F. Deprettere:
Analysis of ESPRIT based joint angle-frequency estimation. ICASSP 2000: 3053-3056
1990 – 1999
- 1999
- [j2]Aweke N. Lemma, Alle-Jan van der Veen, Ed F. Deprettere:
Multiresolution ESPRIT algorithm. IEEE Trans. Signal Process. 47(6): 1722-1726 (1999) - 1998
- [c3]Aweke N. Lemma, Alle-Jan van der Veen, Ed F. Deprettere:
Joint angle-frequency estimation using multi-resolution ESPRIT. ICASSP 1998: 1957-1960 - 1997
- [c2]Aweke N. Lemma, W. Bastiaan Kleijn, Ed F. Deprettere:
Quantization using wavelet based temporal decomposition of the LSF. EUROSPEECH 1997: 1259-1262 - 1996
- [j1]Aweke N. Lemma, Ed F. Deprettere:
Two-sided controlled transition in biorthogonal time-varying filter banks. IEEE Signal Process. Lett. 3(2): 47-50 (1996) - [c1]Aweke N. Lemma, Ed F. Deprettere:
State space behavior in time-varying biorthogonal filter banks. EUSIPCO 1996: 1-4
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint