Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Robust and Secure Media Signature Scheme for JPEG Images., and . VLSI Signal Processing, 41 (3): 305-317 (2005)Error resilient content-based image authentication over wireless channel., , and . ISCAS (3), page 2707-2710. IEEE, (2005)Recovering modified watermarked images with reference to the original image., , and . Security and Watermarking of Multimedia Contents, volume 3657 of SPIE Proceedings, page 415-424. SPIE, (1999)Rate-Distortion-Authentication Optimized Streaming with Multiple Deadlines., , , , and . ICASSP (2), page 701-704. IEEE, (2007)A secure and robust digital signature scheme for JPEG2000 image authentication., and . IEEE Trans. Multim., 7 (3): 480-494 (2005)A more aggressive prefetching scheme for streaming media delivery over the Internet., , and . VCIP, volume 6508 of SPIE Proceedings, page 650818. SPIE, (2007)Multimodal content-based structure analysis of karaoke music., , and . ACM Multimedia, page 638-647. ACM, (2005)Towards Media Semantics: An I2R Perspective.. CIVR, volume 3568 of Lecture Notes in Computer Science, page 60. Springer, (2005)Efficient Remote Entanglement Distribution in Quantum Networks: A Segment-Based Method., , , , , , and . IEEE Trans. Netw. Serv. Manag., 21 (1): 249-265 (February 2024)Entanglement-Assisted Quantum Networks: Mechanics, Enabling Technologies, Challenges, and Research Directions., , , , , , , , , and . IEEE Commun. Surv. Tutorials, 25 (4): 2133-2189 (Fourthquarter 2023)