2007 |
11 | | Oge Marques,
Liam M. Mayron,
Daniel Socek,
Gustavo B. Borba,
Humberto R. Gamba:
An attention-based method for extracting salient regions of interest from stereo images.
VISAPP (2) 2007: 294-297 |
10 | | Dubravko Culibrk,
Daniel Socek,
Oge Marques,
Borko Furht:
Automatic kernel width selection for neural network based video object segmentation.
VISAPP (2) 2007: 472-479 |
9 | EE | Dubravko Culibrk,
Oge Marques,
Daniel Socek,
Hari Kalva,
Borko Furht:
Neural Network Approach to Background Modeling for Video Object Segmentation.
IEEE Transactions on Neural Networks 18(6): 1614-1627 (2007) |
8 | EE | Daniel Socek,
Hari Kalva,
Spyros S. Magliveras,
Oge Marques,
Dubravko Culibrk,
Borko Furht:
New approaches to encryption and steganography for digital videos.
Multimedia Syst. 13(3): 191-204 (2007) |
2006 |
7 | EE | Daniel Socek,
Hari Kalva,
Spyros S. Magliveras,
Oge Marques,
Dubravko Culibrk,
Borko Furht:
A Permutation-Based Correlation-Preserving Encryption Method for Digital Videos.
ICIAR (1) 2006: 547-558 |
6 | EE | Daniel Socek,
Dubravko Culibrk,
Hari Kalva,
Oge Marques,
Borko Furht:
Permutation-Based Low-Complexity Alternate Coding in Multi-View H.264/AVC.
ICME 2006: 2141-2144 |
5 | EE | Daniel Socek,
Michal Sramka,
Oge Marques,
Dubravko Culibrk:
An improvement to a biometric.based multimedia content protection scheme.
MM&Sec 2006: 135-139 |
4 | | Dubravko Culibrk,
Oge Marques,
Daniel Socek,
Hari Kalva,
Borko Furht:
A neural network approach to bayesian background modeling for video object segmentation.
VISAPP (1) 2006: 474-479 |
2005 |
3 | EE | Daniel Socek,
Dubravko Culibrk,
Oge Marques,
Hari Kalva,
Borko Furht:
A Hybrid Color-Based Foreground Object Detection Method for Automated Marine Surveillance.
ACIVS 2005: 340-347 |
2 | EE | Daniel Socek,
Dubravko Culibrk:
On the security of a clipped hopfield neural network-based cryptosystem.
MM&Sec 2005: 71-76 |
2004 |
1 | EE | Tanya E. Seidel,
Daniel Socek,
Michal Sramka:
Parallel Symmetric Attack on NTRU using Non-Deterministic Lattice Reduction.
Des. Codes Cryptography 32(1-3): 369-379 (2004) |