Year |
Citation |
Score |
2012 |
Božović V, Socek D, Steinwandt R, Villányi VI. Multi-authority attribute-based encryption with honest-but-curious central authority International Journal of Computer Mathematics. 89: 268-283. DOI: 10.1080/00207160.2011.555642 |
0.368 |
|
2008 |
Socek D, Božović V, Ćulibrk D. Securing biometric templates where similarity is measured with set intersection Communications in Computer and Information Science. 23: 139-151. DOI: 10.1007/978-3-540-88653-2-10 |
0.307 |
|
2008 |
Fonseca A, Mayron L, Socek D, Marques O. Design and implementation of an optical flow-based autonomous video surveillance system Proceedings of the Iasted International Conference On Internet and Multimedia Systems and Applications and Visual Communications. 209-214. |
0.305 |
|
2008 |
Pertuz C, Mayron L, Socek D, Marques O. A model for detecting and tracking humans using appearance, shape, and motion Proceedings of the Iasted International Conference On Internet and Multimedia Systems and Applications and Visual Communications. 215-220. |
0.369 |
|
2007 |
Culibrk D, Marques O, Socek D, Kalva H, Furht B. Neural network approach to background modeling for video object segmentation. Ieee Transactions On Neural Networks / a Publication of the Ieee Neural Networks Council. 18: 1614-27. PMID 18051181 DOI: 10.1109/Tnn.2007.896861 |
0.678 |
|
2007 |
Socek D, Magliveras S, Ćulibrk D, Marques O, Kalva H, Furht B. Digital video encryption algorithms based on correlation-preserving permutations Eurasip Journal On Information Security. 2007. DOI: 10.1155/2007/52965 |
0.667 |
|
2007 |
Ćulibrk D, Radenković V, Socek D. Enhancing video object segmentation results through biologically inspired postprocessing 8th International Conference On Telecommunications in Modern Satellite, Cable and Broadcasting Services, Telsiks 2007, Proceedings of Papers. 329-332. DOI: 10.1109/TELSKS.2007.4376004 |
0.497 |
|
2007 |
Socek D, Kalva H, Magliveras SS, Marques O, Culibrk D, Furht B. New approaches to encryption and steganography for digital videos Multimedia Systems. 13: 191-204. DOI: 10.1007/S00530-007-0083-Z |
0.677 |
|
2007 |
Culibrk D, Socek D, Marques O, Furht B. Automatic kernel width selection for neural network based video object segmentation Visapp 2007 - 2nd International Conference On Computer Vision Theory and Applications, Proceedings. 472-479. |
0.62 |
|
2006 |
Socek D, Culibrk D, Kalva H, Marques O, Furht B. Permutation-based low-complexity alternate coding in multi-view H.264/AVC 2006 Ieee International Conference On Multimedia and Expo, Icme 2006 - Proceedings. 2006: 2141-2144. DOI: 10.1109/ICME.2006.262659 |
0.565 |
|
2006 |
Socek D, Sramka M, Marques O, Ćulibrk D. An improvement to a biometric-based multimedia content protection scheme Proceedings of the Multimedia and Security Workshop 2006, Mm and Sec'06. 2006: 135-139. |
0.37 |
|
2006 |
Culibrk D, Marques O, Socek D, Kalva H, Furht B. A neural network approach to Bayesian background modeling for video object segmentation Visapp 2006 - Proceedings of the 1st International Conference On Computer Vision Theory and Applications. 1: 474-479. |
0.666 |
|
2006 |
Socek D, Kalva H, Magliveras SS, Marques O, Ćulibrk D, Furht B. A permutation-based correlation-preserving encryption method for digital videos Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4141: 547-558. |
0.663 |
|
2006 |
Socek D, Culibrk D. On the security of a clipped hopfield neural network-based cryptosystem Proceedings of the 7th Multimedia and Security Workshop 2005, Mm and Sec'05. 2006: 71-75. |
0.379 |
|
2005 |
Socek D, Lit S, Magliveras SS, Furht B. Short paper: Enhanced 1-D chaotic key-based algorithm for image encryption Proceedings - First International Conference On Security and Privacy For Emerging Areas in Communications Networks, Securecomm 2005. 2005: 406-408. DOI: 10.1109/SECURECOMM.2005.39 |
0.588 |
|
2005 |
Socek D, Culibrk D, Marques O, Kalva H, Furht B. A hybrid color-based foreground object detection method for automated marine surveillance Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3708: 340-347. DOI: 10.1007/11558484_43 |
0.619 |
|
2004 |
Seidel TE, Socek D, Sramka M. Parallel symmetric attack on NTRU using non-deterministic lattice reduction Designs, Codes, and Cryptography. 32: 369-379. DOI: 10.1023/B:Desi.0000029235.59808.77 |
0.44 |
|
Show low-probability matches. |