Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Flexible Layered Authentication Graph for Multimedia Streaming., , , and . MMSP, page 349-352. IEEE, (2007)Rate-Distortion-Authentication optimized streaming with Generalized Butterfly Graph authentication., , , and . ICIP, page 3096-3099. IEEE, (2008)An Optimized Content-Aware Authentication Scheme for Streaming JPEG-2000 Images Over Lossy Networks., , , and . ICASSP (2), page 293-296. IEEE, (2006)A Hybrid Content-Based Image Authentication Scheme., , and . PCM, volume 4810 of Lecture Notes in Computer Science, page 226-235. Springer, (2007)Rate-Distortion Optimized Streaming of Authenticated Video., , , , and . ICIP, page 1661-1664. IEEE, (2006)A secure and robust approach to scalable video authentication., , , and . ICME, page 209-212. IEEE Computer Society, (2003)Rate-Distortion-Authentication Optimized Streaming with Multiple Deadlines., , , , and . ICASSP (2), page 701-704. IEEE, (2007)A Content-Aware Stream Authentication Scheme Optimized for Distortion and Overhead., , , , and . ICME, page 541-544. IEEE Computer Society, (2006)A unified authentication framework for JPEG2000., , , , , and . ICME, page 915-918. IEEE Computer Society, (2004)A novel lossy-to-lossless watermarking scheme for JEPG2000 images., , and . ICIP, page 573-576. IEEE, (2004)