Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Color image sharpening by moment-preserving technique, , , and . Signal Processing, 45 (3): 397--403 (September 1995)A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement., and . IEEE Communications Letters, 7 (9): 443-445 (2003)An overview of the project for next generation information communication networks., , , and . ITRE, page 206-210. IEEE, (2005)Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Code., and . Int. J. Netw. Secur., 10 (1): 1-10 (2010)A vision system with automatic learning capability for industrial parts inspection., , , and . ICRA, page 417-425. IEEE, (1984)A Unified Approach to Unwarping of Omni-Images into Panoramic and Perspective-View Images Using Pano-Mapping Tables., and . SMC, page 2401-2406. IEEE, (2006)Gray-scale hough transform for thick line detection in gray-scale images., and . Pattern Recognit., 28 (5): 647-661 (1995)Automatic rotational symmetry determination for shape analysis., and . Pattern Recognit., 20 (6): 571-582 (1987)Hough transform with dynamic thresholding for robust and real-time detection of complex curves in images., and . ICASSP, page 1454-1458. IEEE, (2013)A Grayscale Image Authentication Method with a Pixel-level Self-recovering Capability against Image Tampering., and . MVA, page 328-331. (2011)