Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Format-compliant jpeg2000 encryption with combined packet header and packet body protection., , and . MM&Sec, page 87-96. ACM, (2007)Physical Activity in Cardiac Rehabilitation: Towards Citizen-Centered Digital Evidence-Based Interventions., , , , , and . EFMI-STC, volume 275 of Studies in Health Technology and Informatics, page 228-229. IOS Press, (2020)JPEG2000 Part 2 wavelet packet subband structures in fingerprint recognition., , and . VCIP, volume 7744 of SPIE Proceedings, page 77442C. SPIE, (2010)Demo A mobile augmented reality system for portion estimation, , , and . International Symposium on Mixed and Augmented reality -- Media, Arts, Social Science, Humanities and Design (ISMAR-MASH’D, München 2014), page 375-376. Piscataway, IEEE, (2014)Subjective and objective quality assessment of transparently encrypted JPEG2000 images., , , , and . MM&Sec, page 247-252. ACM, (2010)Efficient wavelet packet basis selection in JPEG2000., and . ICIP, page 317-320. IEEE, (2011)Efficient and Rate-Distortion Optimal Wavelet Packet Basis Selection in JPEG2000., and . IEEE Trans. Multim., 14 (2): 264-277 (2012)On Format-Compliant Iterative Encryption of JPEG2000., and . ISM, page 985-990. IEEE Computer Society, (2006)Non-Blind Structure-Preserving Substitution Watermarking of H.264/CAVLC Inter-Frames., , and . IEEE Trans. Multim., 16 (5): 1337-1349 (2014)On JPEG2000 Error Concealment Attacks., and . PSIVT, volume 5414 of Lecture Notes in Computer Science, page 851-861. Springer, (2009)