Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Watermarking for 3D polygonal meshes using normal vector distributions of each patch., , , , and . ICIP (2), page 499-502. IEEE, (2003)Hash function for 3D mesh model authentication., , , and . FCV, page 1-5. IEEE, (2015)Selective Encryption for 3D Printing Model in DCT Domain., , , , , , , , and . ICUFN, page 398-400. IEEE, (2018)Selective Encryption Algorithm for 3D Printing Model Based on Clustering and DCT Domain., , , and . J. Comput. Sci. Eng., 11 (4): 152-159 (December 2017)A Real-Time Architecture of 360-Degree Panoramic Video Streaming System., , and . ICKII, page 477-480. IEEE, (2019)MPEG Postprocessing System Using Edge Signal Variable Filter., , , , and . ICIAR (1), volume 4141 of Lecture Notes in Computer Science, page 146-155. Springer, (2006)Automatic Control Point Selection System based Anthropomorphic Animal Face Masking., , , , , and . ICCA, page 18:1-18:4. ACM, (2020)Automatic Fault Diagnosis of Drills Using Artificial Neural Networks., , , , and . ICMLA, page 992-995. IEEE, (2017)Coding DNA Sequence Watermarking., , , and . FCC, volume 301 of Lecture Notes in Electrical Engineering, page 21-27. Springer, (2014)GIS Vector Map Perceptual Encryption Scheme Using Geometric Objects., , , and . WISA, volume 10144 of Lecture Notes in Computer Science, page 210-220. (2016)