Author of the publication

Identifying Major Components of Pictures by Audio Encoding of Colours.

, , , and . IWINAC (2), volume 4528 of Lecture Notes in Computer Science, page 81-89. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data hiding capacity analysis for real images based on stochastic nonstationary geometrical models., , , and . Security and Watermarking of Multimedia Contents, volume 5020 of SPIE Proceedings, page 580-593. SPIE, (2003)Secure surface identification codes., , , , and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 68190D. SPIE, (2008)Performance analysis of nonuniform quantization-based data hiding., , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60720X. SPIE, (2006)Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding., , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 65051T. SPIE, (2007)Descending Stairs Detection with Low-Power Sensors., , , , and . ECCV Workshops (3), volume 8927 of Lecture Notes in Computer Science, page 658-672. Springer, (2014)Simultaneous exploitation of explicit and implicit tags in affect-based multimedia retrieval., and . ACII, page 1-6. IEEE Computer Society, (2009)Multiple users' emotion recognition: Improving performance by joint modeling of affective reactions., , , , and . ACII, page 92-97. IEEE Computer Society, (2017)Random projections based item authentication., , , and . Media Forensics and Security, volume 7254 of SPIE Proceedings, page 725413. SPIE, (2009)An audio browser for increasing access to world wide web sites for blind and visually impaired computer users., , , and . HCI (2), page 995-998. Lawrence Erlbaum, (1999)Security analysis of robust data-hiding with geometrically structured codebooks., , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 709-720. SPIE, (2005)