Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Binocular 3D Object Recovery Using a Symmetry Prior., , , , and . Symmetry, 9 (5): 64 (2017)A hierarchical protocol for increasing the stealthiness of steganographic methods., , , , , and . MM&Sec, page 16-24. ACM, (2004)Stochastic Models of Video Structure for Program Genre Detection., , , and . VLBV, volume 2849 of Lecture Notes in Computer Science, page 84-92. Springer, (2003)Image data compression using autoregressive time series models., , and . Pattern Recognit., 11 (5-6): 313-323 (1979)An overview of multimedia content protection in consumer electronics devices., and . Signal Process. Image Commun., 16 (7): 681-699 (2001)The use of block truncation coding in DPCM image coding., and . IEEE Trans. Signal Process., 39 (4): 967-971 (1991)Normal Mammogram Detection Based on Local Probability Difference Transforms and Support Vector Machines., , , , , and . IEICE Trans. Inf. Syst., 90-D (1): 258-270 (2007)Printer identification based on graylevel co-occurrence features for security and forensic applications.., , , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 430-440. SPIE, (2005)Inspection of machine parts by backprojection reconstruction., , , and . ICRA, page 503-508. IEEE, (1987)Digital watermarking for color images in hue-saturation-value color space., , , and . J. Electronic Imaging, 23 (3): 033009 (2014)