Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network image coding for multicast., , and . MMSP, page 365-370. IEEE Signal Processing Society, (2008)Performance of a practical blind watermarking scheme., , and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 594-605. SPIE, (2001)Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes., , , , and . IWQoS, page 11-19. IEEE, (2008)Random access for compressed light fields using multiple representations., and . MMSP, page 383-386. IEEE, (2004)Cross-layer design for video streaming over wireless ad hoc networks., , , , and . MMSP, page 99-102. IEEE, (2004)A New Update Step for Reduction of PSNR Fluctuations in Motion-Compensated Lifted Wavelet Video Coding., , , and . MMSP, page 1-4. IEEE, (2005)Image Authentication and Tampering Localization using Distributed Source Coding., , and . MMSP, page 393-396. IEEE, (2007)Digital watermarking of text, image, and video documents., , and . Comput. Graph., 22 (6): 687-695 (1998)Quantization effects on digital watermarks., and . Signal Process., 81 (2): 239-263 (2001)Compressed Histogram of Gradients: A Low-Bitrate Descriptor., , , , , , and . Int. J. Comput. Vis., 96 (3): 384-399 (2012)