Author of the publication

Prediction Trees and Lossless Image Compression: An Extended Abstract.

, , and . Data Compression Conference, page 83-92. IEEE Computer Society, (1991)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing Prediction Gain in Symmetric Axial Scans., , and . ICIP, page 932-935. IEEE, (2000)Circuits and systems for real-time security and copyright protection of multimedia., , and . Comput. Electr. Eng., 35 (2): 231-234 (2009)A 2-D vector excitation coding technique.. Signal Process., 67 (2): 163-172 (1998)Design of a Laboratory for Information Security Education., , , and . World Conference on Information Security Education, volume 253 of IFIP Conference Proceedings, page 61-73. Kluwer, (2003)Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal Public Key Crypto System., and . Security and Watermarking of Multimedia Contents, volume 3657 of SPIE Proceedings, page 289-295. SPIE, (1999)Benchmarking steganographic and steganalysis techniques., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 252-263. SPIE, (2005)How to protect biometric templates., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 650514. SPIE, (2007)Image manipulation detection., , , and . J. Electronic Imaging, 15 (4): 041102 (2006)How Biometric Authentication Poses New Challenges to Our Security and Privacy In the Spotlight.. IEEE Signal Process. Mag., 34 (4): 196-194 (2017)On sequential watermark detection., and . IEEE Trans. Signal Process., 51 (4): 1034-1044 (2003)