From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

New attacks on SARI image authentication system., , , и . Security, Steganography, and Watermarking of Multimedia Contents, том 5306 из Proceedings of SPIE, стр. 602-609. SPIE, (2004)Signed MSB-Set Comb Method for Elliptic Curve Point Multiplication., , , и . ISPEC, том 3903 из Lecture Notes in Computer Science, стр. 13-24. Springer, (2006)A comprehensive human computation framework: with application to image labeling., , , , , и . ACM Multimedia, стр. 479-488. ACM, (2008)Fine Granularity Scalability Encryption of MPEG-4 FGS Bitstreams., , , и . MMSP, стр. 1-4. IEEE, (2005)A Heuristic Framework to Detect Concurrency Vulnerabilities., , , , и . ACSAC, стр. 529-541. ACM, (2018)Arithmetic coding with dual symbol sets and its performance analysis., , и . IEEE Trans. Image Processing, 8 (12): 1667-1676 (1999)Multiresolution scene-based video watermarking using perceptual models., , и . IEEE J. Sel. Areas Commun., 16 (4): 540-550 (1998)Detecting Malicious Web Links and Identifying Their Attack Types., , и . WebApps, USENIX Association, (2011)When DRM Meets Restricted Multicast: A Content Encryption Key Scheme for Multicast Encryption and DRM., и . CCNC, стр. 1048-1052. IEEE, (2007)Data Hiding for Video-in-Video., , и . ICIP (2), стр. 676-679. IEEE Computer Society, (1997)