Author of the publication

An Ensemble of Classifiers Approach to Steganalysis.

, , , and . ICPR, page 4376-4379. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image manipulation detection., , , and . J. Electronic Imaging, 15 (4): 041102 (2006)Improvements on Sensor Noise Based Source Camera Identification., , , and . ICME, page 24-27. IEEE Computer Society, (2007)Sensor Fingerprint Identification Through Composite Fingerprints and Group Testing., , and . IEEE Trans. Information Forensics and Security, 10 (3): 597-612 (2015)Seam-carving based anonymization against image & video source attribution., , and . MMSP, page 272-277. IEEE, (2013)Efficient techniques for sensor fingerprint matching in large image and video databases., , and . Media Forensics and Security, volume 7541 of SPIE Proceedings, page 754109. SPIE, (2010)New Features to Identify Computer Generated Images., , , and . ICIP (4), page 433-436. IEEE, (2007)A classifier design for detecting Image manipulations., , , , and . ICIP, page 2645-2648. IEEE, (2004)Source camera identification based on CFA interpolation., , , and . ICIP (3), page 69-72. IEEE, (2005)Image manipulation detection with Binary Similarity Measures., , , and . EUSIPCO, page 1-4. IEEE, (2005)Video copy detection based on source device characteristics: a complementary approach to content-based methods., , and . Multimedia Information Retrieval, page 435-442. ACM, (2008)