Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the design of content-based multimedia authentication systems.. IEEE Trans. Multim., 4 (3): 385-393 (2002)Pigeonholes and Repunits.. The American Mathematical Monthly, 121 (6): 529-533 (2014)Designing communication systems via iterative improvement: error correction coding with Bayes decoder and codebook optimized for source symbol error.. CoRR, (2018)Spreading Processes with Mutations over Multi-layer Networks., , , , , , and . CoRR, (2022)Error bounds for error diffusion and related digital halftoning algorithms., , , , , and . ISCAS (2), page 513-516. IEEE, (2001)Application of invisible image watermarks to produce remotely printed, duplication-resistant, and demonstrably authentic documents., , , , and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 351-359. SPIE, (2001)Simple three oscillator universal probes for determining synchronization stability in coupled arrays of oscillators.. ISCAS (3), page 261-264. IEEE, (2001)Hybrid halftoning using direct multi-bit search (DMS) screen algorithm., , , and . Color Imaging: Displaying, Processing, Hardcopy, and Applications, volume 9015 of SPIE Proceedings, page 90150P. SPIE, (2014)On control of networks of dynamical systems.. ISCAS, page 3785-3788. IEEE, (2010)Synchronization in systems coupled via complex networks.. ISCAS (4), page 724-727. IEEE, (2004)