Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Group Key Management Scheme for Wireless Cellular Systems., and . I. J. Network Security, 6 (1): 40-52 (2008)An overview of multimedia content protection in consumer electronics devices., and . Sig. Proc.: Image Comm., 16 (7): 681-699 (2001)Normal Mammogram Detection Based on Local Probability Difference Transforms and Support Vector Machines., , , , , and . IEICE Transactions, 90-D (1): 258-270 (2007)Secret Sharing in the Encrypted Domain with Secure Comparison., and . GLOBECOM, page 1-5. IEEE, (2011)A comparison of fixed-point 2D 9/spl times/7 discrete wavelet transform implementations., and . ICIP (1), page 389-392. (2002)Streaming video and rate scalable compression: what are the challenges for watermarking?, , , and . J. Electronic Imaging, 13 (1): 198-208 (2004)Classical geometrical approach to circle fitting - review and new developments., , , and . J. Electronic Imaging, 12 (1): 179-193 (2003)Digital watermarking for color images in hue-saturation-value color space., , , and . J. Electronic Imaging, 23 (3): 033009 (2014)Lapped-orthogonal-transform-based adaptive image watermarking., , , and . J. Electronic Imaging, 15 (1): 013009 (2006)On the distribution of a deforming triangle., and . Pattern Recognition, 23 (12): 1333-1341 (1990)