Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of bit-rate definitions for Brain-Computer Interfaces., , and . CSREA HCI, page 40-46. CSREA Press, (2005)Security analysis of robust data-hiding with geometrically structured codebooks., , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 709-720. SPIE, (2005)Secure robust digital watermarking using the lapped orthogonal transform., , and . Security and Watermarking of Multimedia Contents, volume 3657 of SPIE Proceedings, page 21-30. SPIE, (1999)On reversibility of random binning based data-hiding techniques: security perspectives., , , , and . MM&Sec, page 89-96. ACM, (2006)Secure Distribution of Watermarked Images for a Digital Library of Ancient Papers., , and . ACM DL, page 123-130. ACM, (1997)An Image-Capable Audio Internet Browser for Facilitating Blind User Access to Digital Libraries., , , and . ACM DL, page 301-302. ACM, (1998)The Multi-Touch See ColOr Interface., , , and . ICTA, page 139-142. (2009)Obstacle and Planar Object Detection using Sparse 3D Information for a Smart Walker., , , , and . VISAPP (2), page 292-298. SciTePress, (2014)An audio browser for increasing access to world wide web sites for blind and visually impaired computer users., , , and . HCI (2), page 995-998. Lawrence Erlbaum, (1999)Secure Copyright Protection Techniques for Digital Images., , , , and . Information Hiding, volume 1525 of Lecture Notes in Computer Science, page 169-190. Springer, (1998)