Author of the publication

A Copy-Move Forgery Detection Scheme with Improved Clone Region Estimation.

, , , and . TSA, page 8-16. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure pay-TV for chained hotels., , , , and . Int. J. Inf. Sec., 17 (1): 33-42 (2018)Efficient group key management for secure big data in predictable large-scale networks., , , , and . Concurrency and Computation: Practice and Experience, 28 (4): 1174-1192 (2016)Towards cost-effective and low latency data center network architecture., , , , and . Computer Communications, (2016)Multiple Feature Vectors Based Fault Classification for WSN Integrated Bearing of Rolling Mill., , , and . J. Control. Sci. Eng., (2018)On the Security of Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response., , , , and . CoRR, (2015)Fast Detection of Vehicles Based-on the Moving Region., , , and . CAD/Graphics, page 202-207. IEEE, (2007)On the Security of MTA-OTIBASs (Multiple-TA One-Time Identity-Based Aggregate Signatures)., , , , and . CoRR, (2015)Efficient subtree-based encryption for fuzzy-entity data sharing., , , , , and . Soft Comput., 22 (23): 7961-7976 (2018)On Sketching Quadratic Forms., , , , , and . CoRR, (2015)FRR: Fair remote retrieval of outsourced private medical records in electronic health networks., , , and . Journal of Biomedical Informatics, (2014)