Author of the publication

An Efficient Passive Authentication Scheme for Copy-Move Forgery Based on DCT.

, , and . ICCCS (2), volume 10040 of Lecture Notes in Computer Science, page 417-429. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sensing Information Modelling for Smart City.. SmartCity, page 40-45. IEEE Computer Society, (2015)Review of the Fault Mechanism and Diagnostic Techniques for the Range Extender Hybrid Electric Vehicle., , , , and . IEEE Access, (2017)Watermarking-Based Blind QoS Assessment for Wireless Image Communication., and . JCM, 8 (3): 207-215 (2013)A Speech Content Authentication Algorithm Based on Pseudo-Zernike Moments in DCT Domain., and . IJDCF, 5 (3): 15-34 (2013)Linear Quadratic Regulation for Discrete-Time Systems with Input Delay: Spectral Factorization Approach., , , and . J. Systems Science & Complexity, 21 (1): 46-59 (2008)LBT Based Low Complexity Image Compression Method., , and . ICPR (1), page 941-944. IEEE Computer Society, (2006)The incremental learning algorithm with support vector machine based on hyperplane-distance., , and . Appl. Intell., 34 (1): 19-27 (2011)Study of An Improved Genetic Algorithm Based on Fixed Point theory and hJ1 triangulation in Euclidean Space., , and . JCP, 6 (10): 2173-2179 (2011)Centroid-based semi-fragile audio watermarking in hybrid domain., and . SCIENCE CHINA Information Sciences, 53 (3): 619-633 (2010)Cross correlation feature mining for steganalysis of hash based least significant bit substitution video steganography., , , and . Telecommunication Systems, 63 (4): 523-529 (2016)