My ICASSP 2013 Schedule
Note: Your custom schedule will not be saved unless you create a new account or login to an existing account.
- Create a login based on your email (takes less than one minute)
- Perform 'Paper Search'
- Select papers that you desire to save in your personalized schedule
- Click on 'My Schedule' to see the current list of selected papers
- Click on 'Printable Version' to create a separate window suitable for printing (the header and menu will appear, but will not actually print)
Paper Detail
| Paper: | .4 | ||
| Session: | Data Hiding, Cryptography, and Security Applications | ||
| Session Time: | Thursday, May 30, 15:20 - 17:20 | ||
| Presentation Time: | Thursday, May 30, 15:20 - 17:20 | ||
| Presentation: | Poster | ||
| Topic: | Information Forensics and Security: Signal Processing and Cryptography | ||
| Paper Title: | Maximizing Privacy in Variable Bit Rate Coding | ||
| Authors: | Jiyun Yao; Lehigh University | ||
| Parv Venkitasubramaniam; Lehigh University | |||
