Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lessons from the implementation of an adaptive parts acquisition ePortal., , and . CIKM, page 169-171. ACM, (2003)Real-time video quality monitoring., , , , , , , and . EURASIP J. Adv. Signal Process., (2011)On the Compression of Still Images using the Derivative of Gaussian Transform., and . ICIP (3), page 433-437. IEEE Computer Society, (1998)A rotation, scale and translation resilient public watermark., , , and . ICASSP, page 2065. IEEE Computer Society, (1999)An uncertainty analysis of some real functions for image processing applications., and . ICIP (3), page 670-673. IEEE Computer Society, (1997)Real-time video quality monitoring for mobile devices., , , , and . CISS, page 1-6. IEEE, (2010)Robust content-dependent high-fidelity watermark for tracking in digital cinema., , and . Security and Watermarking of Multimedia Contents, volume 5020 of SPIE Proceedings, page 536-545. SPIE, (2003)Computing the Probability of False Watermark Detection., and . Information Hiding, volume 1768 of Lecture Notes in Computer Science, page 146-158. Springer, (1999)Informed Detection Revisited., and . IWDW, volume 3304 of Lecture Notes in Computer Science, page 29-41. Springer, (2004)H.264/AVC substitution watermarking: a CAVLC example., and . Media Forensics and Security, volume 7254 of SPIE Proceedings, page 72540Z. SPIE, (2009)