Author of the publication

An Improved Occlusion Detection with Constraints Approach for Video Processing.

, , , and . INISCOM, volume 257 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 232-242. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AttendanceKit: A set of Role-Based Mobile Applications for Automatic Attendance Checking with UHF RFID Using Realtime Firebase and Face Recognition., , , and . FDSE (CCIS Volume), volume 1688 of Communications in Computer and Information Science, page 432-446. Springer, (2022)An Improved Occlusion Detection with Constraints Approach for Video Processing., , , and . INISCOM, volume 257 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 232-242. Springer, (2018)Blind image forgeries detection using detail components from the wavelet transform., , and . ICADIWT, volume 288 of Frontiers in Artificial Intelligence and Applications, page 91-104. IOS Press, (2016)Performance Analysis of Automatic Integrated Long-Range RFID and Webcam System., , , , , , and . SN Comput. Sci., 3 (6): 473 (2022)A Deep Learning-Based Method for Image Tampering Detection., , and . FDSE (CCIS Volume), volume 1500 of Communications in Computer and Information Science, page 170-184. Springer, (2021)Smart Grid Cyber-Attack Analysis and Countermeasures., , , and . RIVF, page 590-595. IEEE, (2022)A Model of Vietnamese Optical Character Recognition., , and . RIVF, page 1-6. IEEE, (2022)License Plate Detection and Recognition Using CRAFT and LSTM., , and . IDC, volume 1089 of Studies in Computational Intelligence, page 287-296. Springer, (2022)ORB for Detecting Copy-Move Regions with Scale and Rotation in Image Forensics., , and . FDSE (CCIS Volume), volume 1306 of Communications in Computer and Information Science, page 358-372. Springer, (2020)Zernike Moment-Based Approach for Detecting Duplicated Image Regions by a Modified Method to Reduce Geometrical and Numerical Errors., , , and . ICCSA (4), volume 9158 of Lecture Notes in Computer Science, page 458-475. Springer, (2015)