Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Clue Image Tampering Localization., , , , and . WIFS, page 125-130. IEEE, (2014)Ray Space Transform Interpolation with Convolutional Autoencoder., , , , , and . IWAENC, page 261-265. IEEE, (2018)Fooling PRNU-Based Detectors Through Convolutional Neural Networks., , , , , and . EUSIPCO, page 957-961. IEEE, (2018)Audio phylogenetic analysis using geometric transforms., , , and . WIFS, page 1-6. IEEE, (2017)Attacking image classification based on bag-of-visual-words., , , , , and . WIFS, page 103-108. IEEE, (2013)Phylogenetic analysis of near-duplicate images using processing age metrics., , , and . ICASSP, page 2054-2058. IEEE, (2016)Aligned and non-aligned double JPEG detection using convolutional neural networks., , , , , , , and . J. Visual Communication and Image Representation, (2017)Facing Device Attribution Problem for Stabilized Video Sequences., , , and . IEEE Trans. Information Forensics and Security, (2020)Codec and GOP Identification in Double Compressed Videos., , , and . IEEE Trans. Image Processing, 25 (5): 2298-2310 (2016)Multiple compression detection for video sequences., , , and . MMSP, page 112-117. IEEE, (2012)