Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A robust image authentication method distinguishing JPEG compression from malicious manipulation., and . IEEE Trans. Circuits Syst. Video Techn., 11 (2): 153-168 (2001)Designing high-throughput VLC decoder. I. Concurrent VLSI architectures., and . IEEE Trans. Circuits Syst. Video Techn., 2 (2): 187-196 (1992)Near Duplicate Identification With Spatially Aligned Pyramid Matching., , , , and . IEEE Trans. Circuits Syst. Video Techn., 20 (8): 1068-1079 (2010)Hybrid object-based/block-based coding in video compression at very low bit-rate., , and . Sig. Proc.: Image Comm., 10 (1-3): 159-171 (1997)Objective and subjective quality of service performance of video-on-demand in ATM-WAN., , , and . Sig. Proc.: Image Comm., 14 (6-8): 635-654 (1999)Integrated Spatial and Feature Image Query., and . Multimedia Syst., 7 (2): 129-140 (1999)Predicting Evoked Emotions in Video., , , and . ISM, page 287-294. IEEE Computer Society, (2014)Structure Analysis of Sports Video Using Domain Models., and . ICME, IEEE Computer Society, (2001)Perceptual knowledge construction from annotated image collections., and . ICME (1), page 189-192. IEEE Computer Society, (2002)A Crypto Signature Scheme For Image Authentication Over Wireless Channel., , , and . Int. J. Image Graphics, 5 (1): 135-148 (2005)