Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Thread-based benchmarking deployment., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 248-255. SPIE, (2004)A generalized correlation coefficient: Application to DTI and multi-fiber DTI., , and . MMBIA, page 9-14. IEEE, (2012)Circular interpretation of histogram for reversible watermarking., , and . MMSP, page 345-350. IEEE, (2001)Generalized 2-D Cyclic Patterns for Secret Watermark Generation., and . ICIP, page 77-79. IEEE, (2000)Multi-subject variational registration for probabilistic unbiased atlas generation., , , and . ICIP (3), page 601-604. IEEE, (2005)Watershed-driven active contours for moving object segmentation., , , , , and . ICIP (2), page 818-821. IEEE, (2005)Modelization of Limb Coordination for Human Action Analysis., , and . ICIP, page 1765-1768. IEEE, (2006)Watermarking algorithm based on a human visual model., , and . Signal Process., 66 (3): 319-335 (1998)A fuzzy logic system for content-based bit-rate allocation., , , and . Signal Process. Image Commun., 10 (1-3): 115-141 (1997)Combined Kohonen neural networks and discrete cosine transform method for iterated transformation theory., , and . Signal Process. Image Commun., 16 (7): 643-656 (2001)