Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Audio Secret Management Scheme Using Shamir's Secret Sharing., , and . MMM (1), volume 8935 of Lecture Notes in Computer Science, page 396-407. Springer, (2015)Scaling and Cropping of Wavelet-Based Compressed Images in Hidden Domain., , and . MMM (1), volume 8935 of Lecture Notes in Computer Science, page 430-441. Springer, (2015)A hierarchical model for representation of events in multimedia observation systems.. EIMM@MM, page 57-64. ACM, (2009)Securing Speech Noise Reduction in Outsourced Environment., , and . TOMM, 13 (4): 51:1-51:24 (2017)Active Genetic Learning with Evidential Uncertainty for Identifying Mushroom Toxicity., and . MIPR, page 395-400. IEEE, (2022)Accuracy and Fairness in Pupil Detection Algorithm., , , and . BigMM, page 17-24. IEEE, (2021)A Generative Approach to Mitigate Bias in Face Matching using Learned Latent Structure., , , and . BigMM, page 150-157. IEEE, (2022)Personalized ambient environments using multiple social networks., , , and . ICME Workshops, page 1-6. IEEE Computer Society, (2014)Media-Rich Fake News Detection: A Survey., and . MIPR, page 436-441. IEEE, (2018)Privacy modeling for video data publication., , , , and . ICME, page 60-65. IEEE Computer Society, (2010)