Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Motion trajectory based video authentication., and . ISCAS (3), page 810-813. IEEE, (2003)A scalable signature scheme for video authentication., , and . Multimedia Tools Appl., 34 (1): 107-135 (2007)Detection and removal of lighting & shaking artifacts in home videos., and . ACM Multimedia, page 107-116. ACM, (2002)Music scale modeling for melody matching., and . ACM Multimedia, page 359-362. ACM, (2003)A dual watermarking technique for images., , and . ACM Multimedia (2), page 49-51. ACM, (1999)Multimodal fusion for multimedia analysis: a survey, , , and . Multimedia Systems, 16 (6): 345-379 (2010)A Survey of Music Structure Analysis Techniques for Music Applications, , and . Recent Advances in Multimedia Signal Processing and Communications, volume 231 of Studies in Computational Intelligence, Springer Berlin Heidelberg, (2009)Decision-theoretic approach to maximizing observation of multiple targets in multi-camera surveillance., , , and . AAMAS, page 155-162. IFAAMAS, (2012)VIP: A Unifying Framework for Computational Eye-Gaze Research., , and . HBU, volume 8212 of Lecture Notes in Computer Science, page 209-222. Springer, (2013)A new approch to automatic music video summarization., , and . ICIP, page 625-628. IEEE, (2004)