Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scalable coding of stream cipher encrypted images via adaptive sampling., and . ICIP, page 5522-5526. IEEE, (2014)Global quality of assessment and optimization for the backward-compatible stereoscopic display system., , , , and . ICIP, page 191-195. IEEE, (2017)A Novel Multiple Description Approach to Predictive Video Coding., , , , and . PCM, volume 4810 of Lecture Notes in Computer Science, page 286-295. Springer, (2007)Image copy-move forgery detection using hierarchical feature point matching., and . APSIPA, page 1-4. IEEE, (2016)L2 restoration of L∞-decoded images with context modeling., and . ICIP, page 1989-1992. IEEE, (2011)Maximal level estimation and unbalance reduction for graph signal downsampling., , , and . ICPR, page 3922-3926. IEEE, (2016)On the determination of capacity parameters in PEE-based reversible image watermarking., and . ICASSP, page 1809-1812. IEEE, (2012)Scalable Compression of Stream Cipher Encrypted Images Through Context-Adaptive Sampling., , , , and . IEEE Trans. Inf. Forensics Secur., 9 (11): 1857-1868 (2014)Privacy-Preserving Image Denoising From External Cloud Databases., , , and . IEEE Trans. Inf. Forensics Secur., 12 (6): 1285-1298 (2017)Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching., and . IEEE Trans. Inf. Forensics Secur., 14 (5): 1307-1322 (2019)