Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of invisible image watermarks to produce remotely printed, duplication-resistant, and demonstrably authentic documents., , , , and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 351-359. SPIE, (2001)Error bounds for error diffusion and related digital halftoning algorithms., , , , , and . ISCAS (2), page 513-516. IEEE, (2001)Hybrid halftoning using direct multi-bit search (DMS) screen algorithm., , , and . Color Imaging: Displaying, Processing, Hardcopy, and Applications, volume 9015 of SPIE Proceedings, page 90150P. SPIE, (2014)Designing communication systems via iterative improvement: error correction coding with Bayes decoder and codebook optimized for source symbol error.. CoRR, (2018)Pigeonholes and Repunits.. The American Mathematical Monthly, 121 (6): 529-533 (2014)Control Localization in Networks of Dynamical Systems Connected via a Weighted Tree., and . IEEE Trans. Syst. Man Cybern. Syst., 47 (11): 3030-3036 (2017)Guest Editorial Complex Network for Modern Smart Grid Application - Part 2: Stability, Reliability and Resilience Issues., , , and . IEEE J. Emerg. Sel. Topics Circuits Syst., 7 (3): 345-348 (2017)On the design of content-based multimedia authentication systems.. IEEE Trans. Multim., 4 (3): 385-393 (2002)Simple three oscillator universal probes for determining synchronization stability in coupled arrays of oscillators.. ISCAS (3), page 261-264. IEEE, (2001)Synchronization in systems coupled via complex networks.. ISCAS (4), page 724-727. IEEE, (2004)