Author of the publication

Digital video tampering detection: An overview of passive techniques.

, and . Digital Investigation, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Shape Measures for Content Based Image Retrieval: A Comparison., , and . Inf. Process. Manage., 33 (3): 319-337 (1997)Segmentation of fingerprint images - A composite method., and . Pattern Recognition, 22 (4): 381-385 (1989)Digital video tampering detection: An overview of passive techniques., and . Digital Investigation, (2016)Modeling and Analyzing Multistage Attacks Using Recursive Composition Algebra., , , and . ICISS, volume 11281 of Lecture Notes in Computer Science, page 67-87. Springer, (2018)Automated camera sabotage detection for enhancing video surveillance systems., and . Multimedia Tools Appl., 78 (5): 5819-5841 (2019)An overview of vulnerability assessment and penetration testing techniques., and . J. Computer Virology and Hacking Techniques, 11 (1): 27-49 (2015)Content-Based Image Retrieval Using a Composite Color-Shape Approach., , and . Inf. Process. Manage., 34 (1): 109-120 (1998)STAR - A Multimedia Database System For Trademark Registration., , , , and . ADB, volume 819 of Lecture Notes in Computer Science, page 109-122. Springer, (1994)Real-Time Automatic Camera Sabotage Detection for Surveillance Systems., and . SIRS, volume 425 of Advances in Intelligent Systems and Computing, page 75-84. Springer, (2015)Network intrusion detection system using J48 Decision Tree., and . ICACCI, page 2023-2026. IEEE, (2015)