Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A generic collusion attack optimization strategy for traditional spread-spectrum and quantization index modulation fingerprinting., , , , and . Multimedia Tools Appl., 74 (17): 6967-6988 (2015)Robust localized image watermarking based on invariant regions., , , , and . Digit. Signal Process., 22 (1): 170-180 (2012)A multiple watermarking algorithm based on CDMA technique., , and . ACM Multimedia, page 424-427. ACM, (2004)Efficient Image Copy Detection Using Multiscale Fingerprints., , , , and . IEEE Multim., 19 (1): 60-69 (2012)Unsupervised urban scene segmentation via domain adaptation., , , , and . Neurocomputing, (2020)A new fingerprinting scheme using social network analysis for majority attack., , , and . Telecommun. Syst., 54 (3): 315-331 (2013)Neighborhood preserving hashing for fast similarity search., , , and . ACM Multimedia, page 945-948. ACM, (2012)Graph-without-cut: An Ideal Graph Learning for Image Segmentation., , , , , and . AAAI, page 1188-1194. AAAI Press, (2016)Adaptive Image Watermarking Algorithm in Contourlet Domain., , , and . FCST, page 125-130. IEEE Computer Society, (2007)A Face Tracking Method in Videos Based on Convolutional Neural Networks., , , , and . IJPRAI, 32 (12): 1856017:1-1856017:18 (2018)