Author of the publication

Audio Watermarking Based on the Psychoacoustic Model and Modulated Complex Lapped Transform.

, , , , and . KES (2), volume 4693 of Lecture Notes in Computer Science, page 295-302. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Nakao, Zensho
add a person with the name Nakao, Zensho
 

Other publications of authors with the same name

Robust multi-logo watermarking by RDWT and ICA., , and . Signal Process., 86 (10): 2981-2993 (2006)DCT Watermarking Optimization by Genetic Programming., , , and . Intelligent Information Systems, volume 35 of Advances in Soft Computing, page 347-351. Springer, (2006)Digital Video Watermarking Based on RGB Color Channels and Principal Component Analysis., , and . KES (2), volume 5178 of Lecture Notes in Computer Science, page 125-132. Springer, (2008)Evolutionary CT image reconstruction., , , and . ICNN, page 1608-1611. IEEE, (1997)Genetic Algorithms for Optimization of Boids Model., , , and . KES (2), volume 4252 of Lecture Notes in Computer Science, page 55-62. Springer, (2006)Curvelet-Domain Image Watermarking Based on Edge-Embedding., , , , , and . KES (2), volume 4693 of Lecture Notes in Computer Science, page 311-317. Springer, (2007)Digital watermarking based on curvelet transform., , , , , and . ISSPA, page 1-4. IEEE, (2007)A Hybrid Neural Network Training Approach of Backpropagation and Genetic Algorithm for Classification of Remotely Sensed Images., , and . ICONIP, page 1402-1405. IOA Press, (1998)A Content Dependent Visualization System for Symbolic Representation of Piano Stream., , and . KES (2), volume 4693 of Lecture Notes in Computer Science, page 287-294. Springer, (2007)Robust Digital Watermarking Based On Principal Component Analysis., , and . Int. J. Comput. Intell. Appl., 4 (2): 183-192 (2004)