Author of the publication

Theft-Resistant Video Browsing Using Filtered Versions of Compressed Sequences.

, , , and . ICMCS, page 50-55. IEEE Computer Society, (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data hiding in image and video .I. Fundamental issues and solutions., and . IEEE Trans. Image Processing, 12 (6): 685-695 (2003)Digital Watermarking Using Shuffling., and . ICIP (1), page 291-295. IEEE, (1999)Optimization of recursive cascade filters., , and . ICASSP, page 513-516. IEEE, (1976)Improvement of resolution and reduction of computation in 2D spectral estimation using decimation., and . ICASSP, page 162-165. IEEE, (1984)A Recursive Digital Filter Using DPCM., and . IEEE Trans. Commun., 24 (1): 2-11 (1976)A Matrix Representation of CSMA/CD Networks., and . IEEE Trans. Commun., 33 (1): 53-64 (1985)On a class of linear time-varying filters., and . IEEE Trans. Inf. Theory, 13 (3): 477-481 (1967)Video as Scholary Material in the Digital Library., , , , , and . ADL, volume 1082 of Lecture Notes in Computer Science, page 45-53. Springer, (1995)An Implementation of, and Attacks on, Zero-Knowledge Watermarking., , and . Information Hiding, volume 3200 of Lecture Notes in Computer Science, page 1-12. Springer, (2004)Ground-target detection system for digital video database., , , and . Visual Information Processing, volume 3387 of SPIE Proceedings, page 219-226. SPIE, (1998)