From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Securing Biometric Templates Where Similarity Is Measured with Set Intersection., , и . ICETE (Selected Papers), том 23 из Communications in Computer and Information Science, стр. 139-151. Springer, (2007)An improvement to a biometric.based multimedia content protection scheme., , , и . MM&Sec, стр. 135-139. ACM, (2006)Multimedia encryption and watermarking., , и . Multimedia systems and applications Springer, (2005)A neural network approach to bayesian background modeling for video object segmentation., , , , и . VISAPP (1), стр. 474-479. INSTICC - Institute for Systems and Technologies of Information, Control and Communication, (2006)Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption., , , и . SecureComm, стр. 406-407. IEEE, (2005)On the security of a clipped hopfield neural network-based cryptosystem., и . MM&Sec, стр. 71-76. ACM, (2005)An attention-based method for extracting salient regions of interest from stereo images, , , , и . International Conference on Computer Vision Theory and Applications (VISAPP), Barcelona, Spain, (марта 2007)Digital Video Encryption Algorithms Based on Correlation-Preserving Permutations., , , , , и . EURASIP J. Inf. Secur., (2007)Neural Network Approach to Background Modeling for Video Object Segmentation., , , , и . IEEE Trans. Neural Networks, 18 (6): 1614-1627 (2007)Practical Secure Biometrics using Set Intersection as a Similarity Measure., , и . SECRYPT, стр. 25-32. INSTICC Press, (2007)