Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The use of block truncation coding in DPCM image coding., and . IEEE Trans. Signal Process., 39 (4): 967-971 (1991)Normal Mammogram Detection Based on Local Probability Difference Transforms and Support Vector Machines., , , , , and . IEICE Trans. Inf. Syst., 90-D (1): 258-270 (2007)Estimating Phenotypic Traits From UAV Based RGB Imagery., , , , and . CoRR, (2018)Binocular 3D Object Recovery Using a Symmetry Prior., , , , and . Symmetry, 9 (5): 64 (2017)A hierarchical protocol for increasing the stealthiness of steganographic methods., , , , , and . MM&Sec, page 16-24. ACM, (2004)A Counter-Forensic Method for CNN-Based Camera Model Identification., , , , , and . CoRR, (2018)Stochastic Models of Video Structure for Program Genre Detection., , , and . VLBV, volume 2849 of Lecture Notes in Computer Science, page 84-92. Springer, (2003)Tree-structured piecewise linear adaptive equalization., , and . IEEE Trans. Commun., 41 (1): 70-82 (1993)Neighborhood Matching for Image Retrieval., , , and . IEEE Trans. Multim., 19 (3): 544-558 (2017)Mobile analytics for emergency response and training., , , , , and . Inf. Vis., 7 (1): 77-88 (2008)