Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Report on the 2013 Affective Computing and Intelligent Interaction Conference (ACII 2013)., and . AI Mag., 34 (4): 9- (2013)Performance evaluation in content-based image retrieval: overview and proposals., , , , and . Pattern Recognit. Lett., 22 (5): 593-601 (2001)Archival and retrieval of historical watermark images., , , and . ICIP (2), page 773-776. IEEE Computer Society, (1996)An Embedded Ground Change Detector for a "Smart Walker"., , , , and . IWINAC (1), volume 9107 of Lecture Notes in Computer Science, page 533-542. Springer, (2015)Secure Distribution of Watermarked Images for a Digital Library of Ancient Papers., , and . ACM DL, page 123-130. ACM, (1997)An Image-Capable Audio Internet Browser for Facilitating Blind User Access to Digital Libraries., , , and . ACM DL, page 301-302. ACM, (1998)On reversibility of random binning based data-hiding techniques: security perspectives., , , , and . MM&Sec, page 89-96. ACM, (2006)Fast Robust Template Matching for Affine Resistant Image Watermarks., and . Information Hiding, volume 1768 of Lecture Notes in Computer Science, page 199-210. Springer, (1999)Secure Copyright Protection Techniques for Digital Images., , , , and . Information Hiding, volume 1525 of Lecture Notes in Computer Science, page 169-190. Springer, (1998)Websound: a generic web sonification tool allowing HCI researchers to dynamically create new access modalities., , , , and . CHI Extended Abstracts, page 295-296. ACM, (2000)