Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collusion resistant fingerprinting of digital audio., , , , and . SIN, page 5-12. ACM, (2011)Use of a Neural Network to Identify Man-made Structure in Millimeter-Wave Images for Security Screening Applications., , , and . IJCNN, page 2009-2014. IEEE, (2006)Arrays over roots of unity with perfect autocorrelation and good ZCZ cross-correlation., , and . Adv. in Math. of Comm., 7 (3): 231-242 (2013)Image Modeling Using Inverse Filtering Criteria with Application to Texture Images., and . ICIP (3), page 392-396. IEEE Computer Society, (1994)On allocating the variance of output growth to trend and cycle components, , and . Economics Letters, 30 (4): 323--326 (October 1989)Bispectral analysis and model validation of texture images., and . IEEE Trans. Image Process., 5 (7): 996-1009 (1995)Image modeling using inverse filtering criteria with application to textures., and . IEEE Trans. Image Process., 5 (6): 938-949 (1996)Algebraic construction of a new class of quasi-orthogonal arrays for steganography., , , , and . Security and Watermarking of Multimedia Contents, volume 3657 of SPIE Proceedings, page 354-364. SPIE, (1999)Texture model validation using higher-order statistics., and . ICASSP, page 2673-2676. IEEE Computer Society, (1991)Business cycles. Praeger, New York, NY u.a., (1990)