Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Some image operations on S-tree-related spatial data structures., and . Image Vis. Comput., 17 (12): 897-904 (1999)Real-time Surveillance System by Use of the Face Understanding Technologies., , , , and . DICTA, page 741-750. CSIRO Publishing, (2003)Wavelet-Based Image Fusion by Adaptive Decomposition., and . ISDA (2), page 283-287. IEEE Computer Society, (2008)Toward enhancing the distributed video coder under a multiview video codec framework., , , and . J. Electronic Imaging, 25 (6): 63022 (2016)Security Management of Authentication System Based on Dynamic Biometric Features., , and . TSA, page 63-68. IEEE, (2014)A Transformation-Based Mechanism for Face Recognition., and . SSPR/SPR, volume 2396 of Lecture Notes in Computer Science, page 636-643. Springer, (2002)Texture Image Segmentation Using Adaptive Gray Level Co-occurrence Probabilities.. IPCV, page 604-607. CSREA Press, (2008)Difference-expansion based reversible and visible image watermarking scheme., , and . Multimedia Tools Appl., 76 (6): 8497-8516 (2017)Face Spoofing Detection Based on Local Binary Descriptors., and . Image Processing: Algorithms and Systems, page 105-108. Society for Imaging Science and Technology, (2017)Fast hierarchical face detection., and . ICME, page 301-304. IEEE Computer Society, (2003)