Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiple Messages Embedding Using DCT-Based Mod4 Steganographic Method., , and . MRCS, volume 4105 of Lecture Notes in Computer Science, page 57-65. Springer, (2006)An adaptive QIM- and SVD-based digital image watermarking scheme in the wavelet domain., , and . ICIP, page 421-424. IEEE, (2008)A Composite Approach for Blind Grayscale Logo Watermarking., and . ICIP (3), page 265-268. IEEE, (2007)Enhancing the Performance of Automated Grade Prediction in MOOC using Graph Representation Learning., , , , , and . DSAA, page 1-10. IEEE, (2023)Multi-Task Learning with Context-Oriented Self-Attention for Breast Ultrasound Image Classification and Segmentation., , and . ISBI, page 1-5. IEEE, (2022)Facial Expression Recognition in the Wild via Deep Attentive Center Loss., and . WACV, page 2401-2410. IEEE, (2021)Learning from Relevance Feedback Sessions using a K-Nearest-Neighbor-Based Semantic Repository., , and . ICME, page 1994-1997. IEEE Computer Society, (2007)A hierarchical manifold subgraph ranking system for content-based image retrieval., and . ICME, page 1-6. IEEE Computer Society, (2013)Optimized Feature-Based Image Registration for Rgb and Nir Pairs., and . ICME, page 1-6. IEEE Computer Society, (2018)Bitstream size suppression for DCT-based information hiding method., , , and . ISPACS, page 1-5. IEEE, (2011)