Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Metrics for performance evaluation of video object segmentation and tracking without ground-truth., , and . ICIP (2), page 69-72. IEEE, (2001)Map Segmentation of Color Images Using Constraint Satisfaction Neural Network., and . ICIP (3), page 236-239. IEEE, (1999)Assessment of Thresholding Algorithms for Document Processing., , and . ICIP (1), page 580-584. IEEE, (1999)Statistical evaluation of image quality measures, , and . Journal of Electronic Imaging, 11 (2): 206-223 (2002)Use of M-band wavelet transform for multidirectional and multiscale edge detection., , , , and . ICASSP (5), page 17-20. IEEE Computer Society, (1994)SymPaD: Symbolic Patch Descriptor., , , and . VISAPP (1), page 266-271. SciTePress, (2015)Steganalysis of watermarking techniques using image quality metrics., , and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 523-531. SPIE, (2001)View subspaces for indexing and retrieval of 3D models., , , and . Three-Dimensional Image Processing (3DIP) and Applications, volume 7526 of SPIE Proceedings, page 75260M. SPIE, (2010)Shape-Based Hand Recognition., , , and . IEEE Trans. Image Processing, 15 (7): 1803-1815 (2006)Multi-Level Reversible Data Anonymization via Compressive Sensing and Data Hiding., , , , , and . IEEE Trans. Inf. Forensics Secur., (2021)