Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semi-fragile Tamper Detection using the Discrete Cosine Transform., , , and . SIP, page 23-32. IASTED/ACTA Press, (2003)Efficient Shot Boundary Detection for Action Movies Using Blockwise Motion-Based Features., , and . ISVC, volume 3804 of Lecture Notes in Computer Science, page 478-485. Springer, (2005)Hierarchical Motion-Compensated Frame Interpolation Based on the Pyramid Structure., and . PCM, volume 4261 of Lecture Notes in Computer Science, page 211-220. Springer, (2006)Comparison of eyelid and eyelash detection algorithms for performance improvement of iris recognition., and . ICIP, page 257-260. IEEE, (2008)3-D reconstruction using the Kinect sensor and its application to a visualization system., , , and . SMC, page 3361-3366. IEEE, (2012)Pyramid Structure Using Projection for Progressive Image Transmission., , and . J. Vis. Commun. Image Represent., 5 (4): 322-334 (1994)Edge-preserving artifact-free smoothing with image pyramids., and . Pattern Recognit. Lett., 12 (8): 467-475 (1991)Robust Hausdorff distance matching algorithms using pyramidal structures., , and . Pattern Recognit., 34 (10): 2005-2013 (2001)Interpretation of eight-point discrete cosine and sine transforms as 3×3 orthogonal edge masks in terms of the Frei-Chen masks.. Pattern Recognit. Lett., 20 (8): 807-811 (1999)Stereo matching technique based on the theory of possibility., , and . Pattern Recognit. Lett., 13 (10): 735-744 (1992)