Author of the publication

Joint Source/Channel Coding to Maximize Perceptual Video Quality on Packet Networks.

, , , , and . Real Time Imaging, 5 (5): 329-339 (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Kalman Filter Based Error Resilience for H.264 Motion Vector Recovery., and . PCM (1), volume 3767 of Lecture Notes in Computer Science, page 664-674. Springer, (2005)Scalable Fingerprinting Scheme Using Statistically Secure Anti-collusion Code for Large Scale Contents Distribution., and . EUC, volume 4096 of Lecture Notes in Computer Science, page 560-569. Springer, (2006)Topological Graph Matching Based Dot Pattern Recognition Scheme for Smart Book., and . ICHIT (1), volume 6935 of Lecture Notes in Computer Science, page 598-605. Springer, (2011)Virtually Zero Delay Interaction Between Online Game Players Using Kalman Filter-Based Dead Reckoning with Density and Distance Gain Control Adaptation., and . Int. J. Softw. Eng. Knowl. Eng., 29 (8): 1091-1101 (2019)Scalable and Statistically Secure Fingerprinting Scheme for Mobile Game Content Distribution., and . CIT, page 441-446. IEEE Computer Society, (2007)Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting., and . Information Hiding, volume 4437 of Lecture Notes in Computer Science, page 328-342. Springer, (2006)Perceptually Tuned Auto-correlation Based Video Watermarking Using Independent Component Analysis., and . PCM (2), volume 3768 of Lecture Notes in Computer Science, page 360-370. Springer, (2005)An Improvement of Auto-Correlation Based Video Watermarking Scheme Using Perceptual Masking for Motion., and . ICDCIT, volume 3816 of Lecture Notes in Computer Science, page 410-419. Springer, (2005)Kalman Filter Based Dead Reckoning Algorithm for Minimizing Network Traffic Between Mobile Game Users in Wireless GRID., and . PRICAI, volume 4099 of Lecture Notes in Computer Science, page 61-70. Springer, (2006)Perceptually tuned robust watermarking scheme for digital images., , , and . Pattern Recognit. Lett., 21 (2): 145-149 (2000)