Author of the publication

Compression of Encrypted Visual Data.

, , and . Communications and Multimedia Security, volume 4237 of Lecture Notes in Computer Science, page 141-150. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fingerprint Template Ageing Revisited - It's the Quality, Stupid!, , , , , and . BTAS, page 1-9. IEEE, (2018)Towards standardised fingerprint matching robustness assessment: the StirMark toolkit - cross-database comparisons with minutiae-based matching., , and . IH&MMSec, page 111-116. ACM, (2013)Multiple re-watermarking using varying non-stationary mra with parameterized wavelet filters., , and . MM&Sec, page 63-68. ACM, (2008)Key-dependency for a wavelet-based blind watermarking algorithm., , and . MM&Sec, page 175-179. ACM, (2004)Subjective and objective quality assessment of transparently encrypted JPEG2000 images., , , , and . MM&Sec, page 247-252. ACM, (2010)Fusion of Iris Segmentation Results., and . CIARP (2), volume 8259 of Lecture Notes in Computer Science, page 310-317. Springer, (2013)Assessment of Efficient Fingerprint Image Protection Principles Using Different Types of AFIS., , and . ICICS, volume 9977 of Lecture Notes in Computer Science, page 241-253. Springer, (2016)A Novel Shape Feature Descriptor for the Classification of Polyps in HD Colonoscopy., , and . MCV, volume 8331 of Lecture Notes in Computer Science, page 205-213. Springer, (2013)Security Enhancement of Visual Hashes Through Key Dependent Wavelet Transformations., and . ICIAP, volume 3617 of Lecture Notes in Computer Science, page 543-550. Springer, (2005)Workshop on Parallel and Distributed Computing in Image Processing, Video Processing, and Multimedia (PDIVM 2000)., and . IPDPS Workshops, volume 1800 of Lecture Notes in Computer Science, page 161-162. Springer, (2000)