Author of the publication

Evaluation and Comparison of Anatomical Landmark Detection Methods for Cephalometric X-Ray Images: A Grand Challenge.

, , , , , , , , , , , , , , , , and . IEEE Trans. Med. Imaging, 34 (9): 1890-1900 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data embedding for vector quantization image processing on the basis of adjoining state-codebook mapping., , , , and . Inf. Sci., (2013)VQ Coding in Data Hiding Using Correlated Neighboring Blocks in Security Performance., , , and . PAISI, volume 10241 of Lecture Notes in Computer Science, page 111-128. (2017)Non-embedded Image Protection Approaches Based on Vector Quantization., , , and . ISDA (3), page 620-625. IEEE Computer Society, (2008)A Scheme of PVO with Median Preserving upon Reversible Data Hiding Using Adaptive Embedding Mechanisms., , , , and . CNIOT, ACM, (2024)Steganographic Greedy Algorithms for Data Hiding Based on Differences Under SMVQ., , , and . IWDW, volume 9023 of Lecture Notes in Computer Science, page 599-612. Springer, (2014)Raw reversibility of information hiding on the basis of VQ systems., , , , and . J. Supercomput., 74 (8): 3748-3777 (2018)Steganography of Data Embedding in Multimedia Images Using Interpolation and Histogram Shifting., , , and . IIH-MSP, page 387-390. IEEE, (2013)Reversible data hiding using neighboring block in VQ-compressed images., , and . ICUIMC, page 47. ACM, (2010)Mobile Forensics for Cloud Storage Service on iOS Systems., , , , and . ISITA, page 178-182. IEEE, (2018)Reversible data hiding based on pixel segmentation and prediction for improving hiding capacity., , , and . Signal Image Video Process., 18 (6-7): 5043-5059 (August 2024)