Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A robust audio watermarking technique based on the perceptual evaluation of audio quality algorithm in the multiresolution domain., , and . ISSPIT, page 326-331. IEEE Computer Society, (2010)Multifeature speech/music discrimination based on mid-term level statistics and supervised classifiers., , , and . AICCSA, page 1-8. IEEE Computer Society, (2016)Speaker emotion recognition: from classical classifiers to deep neural networks., , , and . ICMV, volume 10696 of SPIE Proceedings, page 106962M. SPIE, (2017)An Enhanced Hierarchical Traitor Tracing Scheme Based on Clustering Algorithms., , and . HAIS, volume 10334 of Lecture Notes in Computer Science, page 379-390. Springer, (2017)ReVQ-VAE: A Vector Quantization-Variational Autoencoder for COVID-19 Chest X-Ray Image Recovery., , , and . ICCCI, volume 14162 of Lecture Notes in Computer Science, page 753-765. Springer, (2023)Fake COVID-19 videos detector based on frames and audio watermarking., , , and . Multim. Syst., 29 (1): 361-375 (2023)Towards a Blind MAP-Based Traitor Tracing Scheme for Hierarchical Fingerprints., , , and . ICONIP (4), volume 9492 of Lecture Notes in Computer Science, page 505-512. Springer, (2015)Secure Audio Watermarking for Multipurpose Defensive Applications., , and . ENASE, page 743-751. SCITEPRESS, (2024)DCT based Blind Audio Watermarking Scheme., , , and . SIGMAP, page 139-144. SciTePress, (2010)A survey on digital tracing traitors schemes., , and . IAS, page 85-90. IEEE, (2013)