Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An improvement to a biometric.based multimedia content protection scheme., , , and . MM&Sec, page 135-139. ACM, (2006)Securing Biometric Templates Where Similarity Is Measured with Set Intersection., , and . ICETE (Selected Papers), volume 23 of Communications in Computer and Information Science, page 139-151. Springer, (2007)A neural network approach to bayesian background modeling for video object segmentation., , , , and . VISAPP (1), page 474-479. INSTICC - Institute for Systems and Technologies of Information, Control and Communication, (2006)Multimedia encryption and watermarking., , and . Multimedia systems and applications Springer, (2005)Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption., , , and . SecureComm, page 406-407. IEEE, (2005)An attention-based method for extracting salient regions of interest from stereo images, , , , and . International Conference on Computer Vision Theory and Applications (VISAPP), Barcelona, Spain, (March 2007)On the security of a clipped hopfield neural network-based cryptosystem., and . MM&Sec, page 71-76. ACM, (2005)Digital Video Encryption Algorithms Based on Correlation-Preserving Permutations., , , , , and . EURASIP J. Inf. Secur., (2007)Neural Network Approach to Background Modeling for Video Object Segmentation., , , , and . IEEE Trans. Neural Networks, 18 (6): 1614-1627 (2007)Parallel Symmetric Attack on NTRU using Non-Deterministic Lattice Reduction., , and . Des. Codes Cryptogr., 32 (1-3): 369-379 (2004)