From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The role of information theory in watermarking and its application to image watermarking. Signal Processing, 81 (6): 1121--1139 (июня 2001)A high-rate fingerprinting code., и . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, том 6819 из SPIE Proceedings, стр. 68190A. SPIE, (2008)Asymptotic global confidence regions in parametric shape estimation problems., , и . IEEE Trans. Inf. Theory, 46 (5): 1881-1895 (2000)Signal Transmission with Known-Interference Cancellation Lecture Notes.. IEEE Signal Process. Mag., 24 (1): 134-136 (2007)Online learning with kernels: Overcoming the growing sum problem., , и . MLSP, стр. 1-6. IEEE, (2012)Regular Simplex Fingerprints and Their Optimality Properties., и . IWDW, том 3710 из Lecture Notes in Computer Science, стр. 97-109. Springer, (2005)A self-referencing level-set method for image reconstruction from sparse Fourier samples., , и . ICIP (2), стр. 33-36. IEEE, (2001)Game-theoretic analysis of watermark detection., и . ICIP (3), стр. 975-978. IEEE, (2001)Complexity-Regularized Denoising of Poisson-Corrupted Data., и . ICIP, стр. 254-257. IEEE, (2000)Optimal Design of Transform Coders and Quantizers for Image Classification., и . ICIP, стр. 841-844. IEEE, (2000)