Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Saliency Based Image Cropping., , and . ICIAP (1), volume 8156 of Lecture Notes in Computer Science, page 773-782. Springer, (2013)Activity Monitoring Made Easier by Smart 360-degree Cameras., , and . ECCV Workshops (6), volume 13806 of Lecture Notes in Computer Science, page 270-285. Springer, (2022)Combining Top-down and Bottom-up Visual Saliency for Firearms Localization., , , and . SIGMAP, page 25-32. SciTePress, (2014)Automatic Generation of Custom Tourist Routes., , , and . SITIS, page 282-288. IEEE, (2019)Filling-in Gaps in Textured Images Using Bit-Plane Statistics., , and . VISAPP (1), page 122-127. INSTICC - Institute for Systems and Technologies of Information, Control and Communication, (2008)Detecting multiple copies in tampered images., , and . ICIP, page 2117-2120. IEEE, (2010)A Tool to Support the Creation of Datasets of Tampered Videos., and . ICIAP (2), volume 9280 of Lecture Notes in Computer Science, page 665-675. Springer, (2015)State of the art in passive digital image forgery detection: copy-move image forgery., , , , and . Pattern Anal. Appl., 21 (2): 291-306 (2018)A knowledge based architecture for the virtual restoration of ancient photos., , and . Pattern Recognit., (2018)Depth-Aware Multi-object Tracking in Spherical Videos., , , , and . ICIAP (3), volume 13233 of Lecture Notes in Computer Science, page 362-374. Springer, (2022)