Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new approach to image feature detection with applications., , and . Pattern Recognition, 29 (4): 627-640 (1996)Steganographic capacity estimation for the statistical restoration framework., , and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 681916. SPIE, (2008)Steganalysis of spread spectrum data hiding exploiting cover memory., , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 38-46. SPIE, (2005)PixNet: A Localized Feature Representation for Classification and Visual Search., and . IEEE Trans. Multimedia, 17 (5): 616-625 (2015)Peer group image enhancement., , , and . IEEE Trans. Image Processing, 10 (2): 326-334 (2001)Matrix embedding with pseudorandom coefficient selection and error correction for robust and secure steganography., , and . IEEE Trans. Information Forensics and Security, 5 (2): 225-239 (2010)A unified approach to boundary perception: edges, textures, and illusory contours., and . IEEE Trans. Neural Networks, 4 (1): 96-108 (1993)Reference-based probabilistic segmentation as non-rigid registration using Thin Plate Splines., , , and . ICIP, page 3052-3055. IEEE, (2008)Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding scheme., , , and . ICIP, page 1292-1295. IEEE, (2008)A lightweight multiview tracked person descriptor for camera sensor networks., , and . ICIP, page 1976-1979. IEEE, (2008)