Author of the publication

Image Authentication and Tampering Localization using Distributed Source Coding.

, , and . MMSP, page 393-396. IEEE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network image coding for multicast., , and . MMSP, page 365-370. IEEE Signal Processing Society, (2008)Audio authentication based on distributed source coding., , and . ICASSP, page 225-228. IEEE, (2008)Performance of a practical blind watermarking scheme., , and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 594-605. SPIE, (2001)Rate-distortion optimized video streaming with rich acknowledgments., and . VCIP, volume 5308 of SPIE Proceedings, SPIE, (2004)Transform-domain Wyner-Ziv codec for video., , , and . VCIP, volume 5308 of SPIE Proceedings, SPIE, (2004)Peer-assisted packet loss repair for IPTV video multicast., , , and . ACM Multimedia, page 401-410. ACM, (2009)Distributed rate allocation for video streaming over wireless networks with heterogeneous link speeds., and . IWCMC, page 296-301. ACM, (2007)A unified framework for distributed video rate allocation over wireless networks., and . Ad Hoc Networks, 9 (4): 608-622 (2011)Planning and Evaluation of Reorienting Osteotomies of the Proximal Femur in Cases of SCFE Using Virtual Three-Dimensional Models., , , , , and . MICCAI, volume 1496 of Lecture Notes in Computer Science, page 1-8. Springer, (1998)Image Authentication Using Distributed Source Coding., , and . IEEE Trans. Image Processing, 21 (1): 273-283 (2012)