Author of the publication

Near-Duplicate Image Detection in a Visually Salient Riemannian Space.

, , , and . IEEE Trans. Information Forensics and Security, 7 (5): 1578-1593 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Region duplication detection based on Harris corner points and step sector statistics., , , , and . J. Visual Communication and Image Representation, 24 (3): 244-254 (2013)Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk., and . IEEE Signal Process. Lett., 23 (1): 169-173 (2016)Embedding image watermarks in dc components., , and . IEEE Trans. Circuits Syst. Video Techn., 10 (6): 974-979 (2000)A note on the Ate pairing., , and . Int. J. Inf. Sec., 7 (6): 379-382 (2008)JPEG error analysis and its applications to digital image forensics., , and . IEEE Trans. Information Forensics and Security, 5 (3): 480-491 (2010)New Channel Selection Rule for JPEG Steganography., , and . IEEE Trans. Information Forensics and Security, 7 (4): 1181-1191 (2012)A Dwt-Based Image Watermarking Algorithm., , , and . ICME, IEEE Computer Society, (2001)Power constrained multiple signaling in digital image watermarking., , and . MMSP, page 388-393. IEEE, (1998)Mixed-strategy Nash equilibrium in the camera source identification game., , and . ICIP, page 4472-4476. IEEE, (2013)Verification of hidden speaker behind transformation disguised voices., , and . Digital Signal Processing, (2015)