Author of the publication

Target re-identification in low-quality camera networks.

, , , and . Image Processing: Algorithms and Systems, volume 8655 of SPIE Proceedings, page 865502. SPIE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A federated architecture approach for Internet of Things security., , , and . EMTC, page 1-5. IEEE, (2014)The business requirements and technical fabric for the Smart City., , and . EMTC, page 1-6. IEEE, (2014)Template Protection for On-Line Signature-Based Recognition Systems., , and . BIOID, volume 5372 of Lecture Notes in Computer Science, page 170-180. Springer, (2008)A comparison between space-time video descriptors., , and . Image Processing: Algorithms and Systems, volume 8655 of SPIE Proceedings, page 865513. SPIE, (2013)Reversible data hiding in the Fibonacci-Haar transform domain., , and . Image Processing: Algorithms and Systems, volume 7532 of SPIE Proceedings, page 753216. SPIE, (2010)Bayesian anisotropic denoising in the Laguerre Gauss domain., , and . Image Processing: Algorithms and Systems, volume 6812 of SPIE Proceedings, page 681209. SPIE, (2008)Substitutive steganography in the generalized Fibonacci domain., , , , and . Image Processing: Algorithms and Systems, volume 7245 of SPIE Proceedings, page 72450. SPIE, (2009)Structural segmentation for multimedia content-based information retrieval., , , and . Storage and Retrieval for Media Databases, volume 4676 of SPIE Proceedings, page 1-9. SPIE, (2002)A multi-resolution approach to depth field estimation in dense image arrays., , and . ICIP, page 3358-3362. IEEE, (2015)Data Hiding Driven by Perceptual Features., , and . MMSP, page 1-4. IEEE, (2005)