Author of the publication

Determining Image Origin and Integrity Using Sensor Noise.

, , , and . IEEE Trans. Information Forensics and Security, 3 (1): 74-90 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Steganographic Embedding Efficiency., , and . Information Hiding, volume 4437 of Lecture Notes in Computer Science, page 282-296. Springer, (2006)Steganalysis of LSB Replacement Using Parity-Aware Features., and . Information Hiding, volume 7692 of Lecture Notes in Computer Science, page 31-45. Springer, (2012)Scalable Processing History Detector for JPEG Images., and . Media Watermarking, Security, and Forensics, page 128-137. Ingenta, (2017)Payload Scaling for Adaptive Steganography: An Empirical Study., and . IEEE Signal Process. Lett., 26 (9): 1339-1343 (2019)Reliable detection of LSB steganography in color and grayscale images., , and . MM&Sec, page 27-30. ACM, (2001)Novelty detection in blind steganalysis., and . MM&Sec, page 167-176. ACM, (2008)Steganography using Gibbs random fields., and . MM&Sec, page 199-212. ACM, (2010)Quantitative steganalysis of LSB embedding in JPEG domain., and . MM&Sec, page 187-198. ACM, (2010)Quantitative steganalysis using rich models., and . Media Watermarking, Security, and Forensics, volume 8665 of SPIE Proceedings, page 86650O. SPIE, (2013)Sensor-fingerprint based identification of images corrected for lens distortion., and . Media Watermarking, Security, and Forensics, volume 8303 of SPIE Proceedings, page 83030H. SPIE, (2012)