Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multi-feature Based Invertible Authentication Watermarking for JPEG Images., , , and . IWDW, volume 3304 of Lecture Notes in Computer Science, page 152-162. Springer, (2004)SLPNet: Towards End-to-End Car License Plate Detection and Recognition Using Lightweight CNN., , and . PRCV (2), volume 12306 of Lecture Notes in Computer Science, page 290-302. Springer, (2020)Recognizing human actions from silhouettes described with weighted distance metric and kinematics., , , and . Multim. Tools Appl., 76 (21): 21889-21910 (2017)A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps., , and . Int. J. Bifurc. Chaos, 14 (10): 3613-3624 (2004)An efficient data-scalable algorithm for image orientation detection., , and . ICIP, page 2665-2668. IEEE, (2010)Object Tracking with Self-updating Tracking Window., , , and . PAISI, volume 4430 of Lecture Notes in Computer Science, page 82-93. Springer, (2007)Video Mosaic with Block Matching and M-Estimation., , , , and . CSIE (6), page 632-635. IEEE Computer Society, (2009)Robust Real-Time Detection of Abandoned and Removed Objects., , , and . ICIG, page 156-161. IEEE Computer Society, (2009)A unified framework for authenticating topology integrity of 2D heterogeneous engineering CAD drawings., , , , and . Multimedia Tools Appl., 76 (20): 20663-20689 (2017)A review of boosting methods for imbalanced data classification., and . Pattern Anal. Appl., 17 (4): 679-693 (2014)