Author of the publication

Optimal packetization of fine granularity scalability codestreams for error-prone channels.

, , , and . ICIP (2), page 185-188. IEEE, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Malicious Web Links and Identifying Their Attack Types., , and . WebApps, USENIX Association, (2011)A Heuristic Framework to Detect Concurrency Vulnerabilities., , , , and . ACSAC, page 529-541. ACM, (2018)Arithmetic coding with dual symbol sets and its performance analysis., , and . IEEE Trans. Image Processing, 8 (12): 1667-1676 (1999)New attacks on SARI image authentication system., , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 602-609. SPIE, (2004)Multiresolution scene-based video watermarking using perceptual models., , and . IEEE J. Sel. Areas Commun., 16 (4): 540-550 (1998)A comprehensive human computation framework: with application to image labeling., , , , , and . ACM Multimedia, page 479-488. ACM, (2008)Fine Granularity Scalability Encryption of MPEG-4 FGS Bitstreams., , , and . MMSP, page 1-4. IEEE, (2005)Signed MSB-Set Comb Method for Elliptic Curve Point Multiplication., , , and . ISPEC, volume 3903 of Lecture Notes in Computer Science, page 13-24. Springer, (2006)When DRM Meets Restricted Multicast: A Content Encryption Key Scheme for Multicast Encryption and DRM., and . CCNC, page 1048-1052. IEEE, (2007)Data Hiding for Video-in-Video., , and . ICIP (2), page 676-679. IEEE Computer Society, (1997)