Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multivariate mutual information for audio video fusion., , , , , and . Signal Image Video Process., 10 (7): 1265-1272 (2016)Robust audio watermarking using frequency-selective spread spectrum., , and . IET Inf. Secur., 2 (4): 129-150 (2008)Audio Recording Location Identification Using Acoustic Environment Signature., and . IEEE Trans. Inf. Forensics Secur., 8 (11): 1746-1759 (2013)Steganalysis of QIM steganography using irregularity measure.. MM&Sec, page 149-158. ACM, (2008)Audio Watermark Detection Using Undetermined ICA., and . ICA, volume 5441 of Lecture Notes in Computer Science, page 637-645. Springer, (2009)Acoustic environment identification using unsupervised learning., and . Secur. Informatics, 3 (1): 11 (2014)A decision tree framework for shot classification of field sports videos., , , and . J. Supercomput., 76 (9): 7242-7267 (2020)Location-aware Beamforming for MIMO-enabled UAV Communications: An Unknown Input Observer Approach., , and . CoRR, (2021)An intelligent approach for robust detection and recognition of multiple color and font styles automobiles license plates: A feature-based algorithm., , and . ICAILP, page 956-961. IEEE, (2014)An Application Agnostic Defense Against the Dark Arts of Cryptojacking., , , and . DSN, page 314-325. IEEE, (2021)