Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hash function based on chaotic neural networks., , , and . ISCAS, IEEE, (2006)On the Performance of Joint Fingerprint Embedding and Decryption Scheme, , , and . CoRR, (2007)Secure multimedia browser over network., , , , and . Visual Information Processing, volume 6246 of SPIE Proceedings, page 62460T. SPIE, (2006)Texture segmentation using directional empirical mode decomposition., , and . ICIP, page 279-282. IEEE, (2004)Secure Media Distribution Scheme Based on Chaotic Neural Network., , , and . ISNN (2), volume 4492 of Lecture Notes in Computer Science, page 79-87. Springer, (2007)Selective Video Encryption Based on Advanced Video Coding., , , and . PCM (2), volume 3768 of Lecture Notes in Computer Science, page 281-290. Springer, (2005)Image Desynchronization for Secure Collusion-Resilient Fingerprint in Compression Domain., , and . PCM, volume 4261 of Lecture Notes in Computer Science, page 56-63. Springer, (2006)The France Telecom Orange Labs (Beijing) Video High-level Feature Extraction Systems - TrecVid 2009 Notebook Paper., , , , , , , , , and 1 other author(s). TRECVID, National Institute of Standards and Technology (NIST), (2009)Secure Distribution Scheme for Compressed Data Streams., , , and . ICIP, page 1953-1956. IEEE, (2006)Texture Classification Through Directional Empirical Mode Decomposition., , and . ICPR (4), page 803-806. IEEE Computer Society, (2004)