Author of the publication

Identifying Digital Cameras Using CFA Interpolation.

, , and . IFIP Int. Conf. Digital Forensics, volume 222 of IFIP Advances in Information and Communication Technology, page 289-299. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Benchmarking steganographic and steganalysis techniques., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 252-263. SPIE, (2005)PSteg: steganographic embedding through patching., , , and . ICASSP (2), page 537-540. IEEE, (2005)An overview of scalar quantization based data hiding methods., , and . Signal Processing, 86 (5): 893-914 (2006)A preliminary examination technique for audio evidence to distinguish speech from non-speech using objective speech quality measures., and . Speech Communication, (2014)Improved utilization of embedding distortion in scalar quantization based data hiding techniques., , , and . Signal Processing, 87 (5): 877-890 (2007)How to Measure Biometric Information?, , and . ICPR, page 1469-1472. IEEE Computer Society, (2010)An efficient and robust method for detecting copy-move forgery., , and . ICASSP, page 1053-1056. IEEE, (2009)Digital Image Forensics for Identifying Computer Generated and Digital Camera Images., , and . ICIP, page 2313-2316. IEEE, (2006)Efficient Sensor Fingerprint Matching Through Fingerprint Binarization., , and . IEEE Trans. Information Forensics and Security, 7 (4): 1404-1413 (2012)Recent advances in counter PRNU based source attribution and beyond., , , and . Media Watermarking, Security, and Forensics, volume 9409 of SPIE Proceedings, page 94090N. SPIE, (2015)