Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identification of the motion estimation strategy using eigenalgorithms., , and . ICIP, page 4477-4481. IEEE, (2013)Correction method for nonideal iris recognition., , , and . ICIP, page 1149-1152. IEEE, (2012)Detectability-quality trade-off in JPEG counter-forensics., , and . ICIP, page 5337-5341. IEEE, (2014)A phylogenetic analysis of near-duplicate audio tracks., , and . MMSP, page 99-104. IEEE, (2013)Local tampering detection in video sequences., , , and . MMSP, page 488-493. IEEE, (2013)Robust wireless video multicast based on a distributed source coding approach., , , and . Signal Processing, 86 (11): 3196-3211 (2006)Geometric calibration of distributed microphone arrays from acoustic source correspondences., , , , , and . MMSP, page 13-18. IEEE, (2010)Using partial information for face recognition and pose estimation., , , and . ICME, page 1006-1009. IEEE Computer Society, (2005)Mixed 2D-3D Information for Pose Estimation and Face Recognition., , , and . ICASSP (2), page 361-364. IEEE, (2006)Demosaicing strategy identification via eigenalgorithms., , , and . ICASSP, page 2659-2663. IEEE, (2014)