Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fully Decentralized Time-Lock Encryption System on Blockchain., , and . Blockchain, page 302-307. IEEE, (2019)Bridging Music Using Sound-Effect Insertion., , , and . IEEE Multim., 22 (4): 30-38 (2015)Theoretical aspects of vertically invariant gray-level morphological operators and their application on adaptive signal and image filtering., , and . IEEE Trans. Signal Process., 47 (4): 1049-1060 (1999)Fully scalable video codec., , and . VCIP, volume 4310 of Proceedings of SPIE, page 908-919. SPIE, (2001)The lightweight genetic search algorithm: an efficient genetic algorithm for small search range problems., and . International Journal of Computational Engineering Science, 5 (3): 639-663 (2004)Digital invisible ink and its applications in steganography., , and . MM&Sec, page 23-28. ACM, (2006)Collaborative knowledge semantic graph image search., , , , and . WWW, page 1055-1056. ACM, (2008)Model-based object recognition using range images by combining morphological feature extraction and geometric hashing., , and . ICPR, page 565-569. IEEE Computer Society, (1996)Automatic facial feature extraction by applying genetic algorithms., and . ICNN, page 1363-1367. IEEE, (1997)JQF: Optimal JPEG Quantization Table Fusion by Simulated Annealing on Texture Images and Predicting Textures., and . DCC, page 344. IEEE, (2021)