Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Group Key Management Scheme for Wireless Cellular Systems., and . I. J. Network Security, 6 (1): 40-52 (2008)Normal Mammogram Detection Based on Local Probability Difference Transforms and Support Vector Machines., , , , , and . IEICE Transactions, 90-D (1): 258-270 (2007)An overview of multimedia content protection in consumer electronics devices., and . Sig. Proc.: Image Comm., 16 (7): 681-699 (2001)On the distribution of a deforming triangle., and . Pattern Recognition, 23 (12): 1333-1341 (1990)Image data compression using autoregressive time series models., , and . Pattern Recognition, 11 (5-6): 313-323 (1979)Streaming video and rate scalable compression: what are the challenges for watermarking?, , , and . J. Electronic Imaging, 13 (1): 198-208 (2004)Classical geometrical approach to circle fitting - review and new developments., , , and . J. Electronic Imaging, 12 (1): 179-193 (2003)Digital watermarking for color images in hue-saturation-value color space., , , and . J. Electronic Imaging, 23 (3): 033009 (2014)Lapped-orthogonal-transform-based adaptive image watermarking., , , and . J. Electronic Imaging, 15 (1): 013009 (2006)Secret Sharing in the Encrypted Domain with Secure Comparison., and . GLOBECOM, page 1-5. IEEE, (2011)