Author of the publication

A cropping-robust watermarking method based on singular value decomposition and Haar transformation.

, , , , and . Syst. Comput. Jpn., 34 (9): 38-47 (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of machine learning algorithms for intrusion detection system., , , and . SISY, page 277-282. IEEE, (2017)A general extension of fuzzy SVD rule base reduction using arbitrary inference algorithm., , , , and . SMC, page 2785-2790. IEEE, (1998)Adapting the scale and move FRI for the fuzziness interpolation of the double fuzzy point rule representation.. FUZZ-IEEE, page 1-7. IEEE, (2013)Fuzzy Interpolation of Fuzzy Rough Sets., and . FUZZ-IEEE, page 1-5. IEEE, (2022)Interpolation based Fuzzy Automaton for Human-Robot Interaction., , , , and . SyRoCo, volume 42 of IFAC Proceedings Volumes, page 317-322. International Federation of Automatic Control, (2009)Etho-robotics: What kind of behaviour can we learn from the animals?, , , and . SyRoCo, volume 48 of IFAC-PapersOnline, page 244-255. International Federation of Automatic Control, (2015)Interpolative Fuzzy Reasoning in Behaviour-Based Control.. Fuzzy Days, volume 33 of Advances in Soft Computing, page 159-170. Springer, (2004)FRI model based pre-evaluation in IEC., and . SACI, page 35-40. IEEE, (2009)Evaluation of Machine Learning Algorithms for Intrusion Detection System., , , and . CoRR, (2018)Detection of IoT-botnet attacks using fuzzy rule interpolation., , , and . J. Intell. Fuzzy Syst., 39 (1): 421-431 (2020)