Author of the publication

Image modeling using inverse filtering criteria with application to textures.

, and . IEEE Trans. Image Process., 5 (6): 938-949 (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collusion resistant fingerprinting of digital audio., , , , and . SIN, page 5-12. ACM, (2011)Arrays over roots of unity with perfect autocorrelation and good ZCZ cross-correlation., , and . Adv. in Math. of Comm., 7 (3): 231-242 (2013)Image Modeling Using Inverse Filtering Criteria with Application to Texture Images., and . ICIP (3), page 392-396. IEEE Computer Society, (1994)Use of a Neural Network to Identify Man-made Structure in Millimeter-Wave Images for Security Screening Applications., , , and . IJCNN, page 2009-2014. IEEE, (2006)Perfect Sequences of Unbounded Lengths over the Basic Quaternions., and . SETA, volume 7280 of Lecture Notes in Computer Science, page 159-167. Springer, (2012)New Sets of Binary and Ternary Sequences with Low Correlation., , and . SETA, volume 3486 of Lecture Notes in Computer Science, page 220-235. Springer, (2004)Secure arrays for digital watermarking., , , and . ICPR, page 1643-1645. IEEE Computer Society, (1998)Watermarking at point of origin., and . ACM Multimedia Workshops, page 135-138. ACM Press, (2000)Business cycles. Praeger, New York, NY u.a., (1990)Algebraic construction of a new class of quasi-orthogonal arrays for steganography., , , , and . Security and Watermarking of Multimedia Contents, volume 3657 of SPIE Proceedings, page 354-364. SPIE, (1999)