Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Use of inferential statistics to estimate error probability of video watermarks., , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 391-399. SPIE, (2005)Print traceability systems framework using digital watermarks for binary images., , , , and . SMC (4), page 3285-3290. IEEE, (2004)Probabilistic enhancement of approximate indexing in metric spaces., , , and . Inf. Syst., 38 (7): 1007-1018 (2013)Correlation functions of finite XXZ model with boundaries, and . Chaos, Solitons & Fractals, 11 (4): 565--579 (March 2000)Use of Gap-Filling Operation to Enhance Image Quality of Binary Image Watermarking., , , , and . IIH-MSP, page 25-28. IEEE Computer Society, (2007)Use of Motion Estimation to Improve Video Watermarking for MPEG Encoders., , , and . IWDW, volume 2939 of Lecture Notes in Computer Science, page 184-199. Springer, (2003)High-accuracy text search of hardcopy logs., , , , and . iiWAS, page 628-632. ACM, (2009)Real-time video watermark embedding system using software on personal computer., , , , and . SMC, page 3369-3373. IEEE, (2005)Magnetization formula in the bounded XYZ spin chain, and . Chaos, Solitons & Fractals, 11 (9): 1339--1348 (July 2000)Settling time design for nonlinear finite-time control systems., , and . CDC, page 4574-4579. IEEE, (2012)