Author of the publication

Watermarking Document Images with Bounding Box Expansion.

, and . Information Hiding, volume 1174 of Lecture Notes in Computer Science, page 227-235. Springer, (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A note on histogram equalization for optimal intensity range utilization.. Computer Vision, Graphics, and Image Processing, 41 (2): 229-232 (1988)Call Center Customer Verification by Query-Directed Passwords., , and . Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, page 54-67. Springer, (2004)Innovations in fingerprint capture devices., and . Pattern Recognit., 36 (2): 361-369 (2003)Document Image Analysis Systems - Guest Editors' Introduction to the Special Issue., and . Computer, 25 (7): 5-8 (1992)Determination of vitality from a non-invasive biomedical measurement for use in fingerprint scanners., , , and . Pattern Recognit., 36 (2): 383-396 (2003)SEPTEMBER - secure electronic publishing trial., , , , , , and . IEEE Commun. Mag., 34 (5): 48-55 (1996)Using Information Extraction for Quality Analysis in Human Authentication., , , and . HICSS, IEEE Computer Society, (2005)Efficient Multi-Band Temporal Video Filter for Reducing Human-Robot Interaction.. CoRR, (2024)A comparison of methods and computation for multi-resolution low- and band-pass transforms for image processing., and . Computer Vision, Graphics, and Image Processing, 37 (3): 386-401 (1987)Basic Techniques and Symbol-Level Recognition - An Overview.. GREC, volume 1072 of Lecture Notes in Computer Science, page 1-12. Springer, (1995)