Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Audio Secret Management Scheme Using Shamir's Secret Sharing., , and . MMM (1), volume 8935 of Lecture Notes in Computer Science, page 396-407. Springer, (2015)Scaling and Cropping of Wavelet-Based Compressed Images in Hidden Domain., , and . MMM (1), volume 8935 of Lecture Notes in Computer Science, page 430-441. Springer, (2015)Learning Multisensor Confidence Using a Reward-and-Punishment Mechanism., , and . IEEE Trans. Instrum. Meas., 58 (5): 1525-1534 (2009)Determining trust in media-rich websites using semantic similarity., , , , and . Multim. Tools Appl., 60 (1): 69-96 (2012)A hierarchical model for representation of events in multimedia observation systems.. EIMM@MM, page 57-64. ACM, (2009)Securing Speech Noise Reduction in Outsourced Environment., , and . TOMM, 13 (4): 51:1-51:24 (2017)Multi-Camera Coordination and Control in Surveillance Systems: A Survey., , and . TOMM, 11 (4): 57:1-57:30 (2015)Active Genetic Learning with Evidential Uncertainty for Identifying Mushroom Toxicity., and . MIPR, page 395-400. IEEE, (2022)A design methodology for selection and placement of sensors in multimedia surveillance systems., , , , and . VSSN@MM, page 121-130. ACM, (2006)Coopetitive Multimedia Surveillance., , and . MMM (2), volume 4352 of Lecture Notes in Computer Science, page 343-352. Springer, (2007)