Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Further study on YASS: steganography based on randomized embedding to resist blind steganalysis., , and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 681917. SPIE, (2008)Tools for texture- and color-based search of images., , and . Human Vision and Electronic Imaging, volume 3016 of SPIE Proceedings, page 496-507. SPIE, (1997)Image dependent log-likelihood ratio allocation for repeat accumulate code-based decoding in data hiding channels., and . Media Forensics and Security, volume 7541 of SPIE Proceedings, page 754113. SPIE, (2010)YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis., , and . Information Hiding, volume 4567 of Lecture Notes in Computer Science, page 16-31. Springer, (2007)Deep Eye-CU (DECU): Summarization of Patient Motion in the ICU., , , and . ECCV Workshops (2), volume 9914 of Lecture Notes in Computer Science, page 178-194. (2016)Accurate 3D Cell Segmentation using Deep Feature and CRF Refinement., , , , and . CoRR, (2019)Generalized subspace based high dimensional density estimation., , , , and . ICIP, page 1849-1852. IEEE, (2011)Image segmentation using curve evolution and flow fields., , and . ICIP (1), page 105-108. IEEE, (2002)Redundancy in All Pairs Fast Marching Method., , and . ICIP, page 3033-3036. IEEE, (2006)Determining Achievable Rates for Secure, Zero Divergence, Steganography., , , , and . ICIP, page 121-124. IEEE, (2006)