| 2007 |
| 11 | | Oge Marques,
Liam M. Mayron,
Daniel Socek,
Gustavo B. Borba,
Humberto R. Gamba:
An attention-based method for extracting salient regions of interest from stereo images.
VISAPP (2) 2007: 294-297 |
| 10 | | Dubravko Culibrk,
Daniel Socek,
Oge Marques,
Borko Furht:
Automatic kernel width selection for neural network based video object segmentation.
VISAPP (2) 2007: 472-479 |
| 9 | EE | Dubravko Culibrk,
Oge Marques,
Daniel Socek,
Hari Kalva,
Borko Furht:
Neural Network Approach to Background Modeling for Video Object Segmentation.
IEEE Transactions on Neural Networks 18(6): 1614-1627 (2007) |
| 8 | EE | Daniel Socek,
Hari Kalva,
Spyros S. Magliveras,
Oge Marques,
Dubravko Culibrk,
Borko Furht:
New approaches to encryption and steganography for digital videos.
Multimedia Syst. 13(3): 191-204 (2007) |
| 2006 |
| 7 | EE | Daniel Socek,
Hari Kalva,
Spyros S. Magliveras,
Oge Marques,
Dubravko Culibrk,
Borko Furht:
A Permutation-Based Correlation-Preserving Encryption Method for Digital Videos.
ICIAR (1) 2006: 547-558 |
| 6 | EE | Daniel Socek,
Dubravko Culibrk,
Hari Kalva,
Oge Marques,
Borko Furht:
Permutation-Based Low-Complexity Alternate Coding in Multi-View H.264/AVC.
ICME 2006: 2141-2144 |
| 5 | EE | Daniel Socek,
Michal Sramka,
Oge Marques,
Dubravko Culibrk:
An improvement to a biometric.based multimedia content protection scheme.
MM&Sec 2006: 135-139 |
| 4 | | Dubravko Culibrk,
Oge Marques,
Daniel Socek,
Hari Kalva,
Borko Furht:
A neural network approach to bayesian background modeling for video object segmentation.
VISAPP (1) 2006: 474-479 |
| 2005 |
| 3 | EE | Daniel Socek,
Dubravko Culibrk,
Oge Marques,
Hari Kalva,
Borko Furht:
A Hybrid Color-Based Foreground Object Detection Method for Automated Marine Surveillance.
ACIVS 2005: 340-347 |
| 2 | EE | Daniel Socek,
Dubravko Culibrk:
On the security of a clipped hopfield neural network-based cryptosystem.
MM&Sec 2005: 71-76 |
| 2004 |
| 1 | EE | Tanya E. Seidel,
Daniel Socek,
Michal Sramka:
Parallel Symmetric Attack on NTRU using Non-Deterministic Lattice Reduction.
Des. Codes Cryptography 32(1-3): 369-379 (2004) |