Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reversible watermarking using prediction and Difference Expansion., , , and . EUVIP, page 71-76. IEEE, (2010)A hybrid constrained unequal error protection and data hiding scheme for packet video transmission., , , and . ICASSP (5), page 680-683. IEEE, (2003)A robust error concealment technique using data hiding for image and video transmission over lossy channels., , , and . IEEE Trans. Circuits Syst. Video Techn., 15 (11): 1394-1406 (2005)Image database TID2013: Peculiarities, results and perspectives., , , , , , , , , and 1 other author(s). Sig. Proc.: Image Comm., (2015)Reduced Reference Quality Assessment of Light Field Images., , and . TBC, 65 (1): 152-165 (2019)Color image database for evaluation of image quality metrics., , , , , and . MMSP, page 403-408. IEEE Signal Processing Society, (2008)Difference expansion and prediction for high bit-rate reversible data hiding., , , , and . J. Electronic Imaging, 21 (3): 033013 (2012)Ear recognition based on edge potential function., , , and . Image Processing: Algorithms and Systems / Parallel Processing for Imaging Applications, volume 8295 of SPIE Proceedings, page 829508. SPIE, (2012)Target re-identification in low-quality camera networks., , , and . Image Processing: Algorithms and Systems, volume 8655 of SPIE Proceedings, page 865502. SPIE, (2013)Fountain code based AL-FEC for multicast services in MANETs., , , and . WTS, page 1-7. IEEE, (2011)