Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Audio Secret Management Scheme Using Shamir's Secret Sharing., , and . MMM (1), volume 8935 of Lecture Notes in Computer Science, page 396-407. Springer, (2015)Scaling and Cropping of Wavelet-Based Compressed Images in Hidden Domain., , and . MMM (1), volume 8935 of Lecture Notes in Computer Science, page 430-441. Springer, (2015)Securing Speech Noise Reduction in Outsourced Environment., , and . TOMM, 13 (4): 51:1-51:24 (2017)Multi-Camera Coordination and Control in Surveillance Systems: A Survey., , and . TOMM, 11 (4): 57:1-57:30 (2015)A hierarchical model for representation of events in multimedia observation systems.. EIMM@MM, page 57-64. ACM, (2009)Determining trust in media-rich websites using semantic similarity., , , , and . Multim. Tools Appl., 60 (1): 69-96 (2012)Learning Multisensor Confidence Using a Reward-and-Punishment Mechanism., , and . IEEE Trans. Instrum. Meas., 58 (5): 1525-1534 (2009)Accuracy and Fairness in Pupil Detection Algorithm., , , and . BigMM, page 17-24. IEEE, (2021)A Generative Approach to Mitigate Bias in Face Matching using Learned Latent Structure., , , and . BigMM, page 150-157. IEEE, (2022)Active Genetic Learning with Evidential Uncertainty for Identifying Mushroom Toxicity., and . MIPR, page 395-400. IEEE, (2022)