Author of the publication

Exposing photo manipulation from user-guided 3D lighting analysis.

, , and . Media Watermarking, Security, and Forensics, volume 9409 of SPIE Proceedings, page 940902. SPIE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Humans Are Easily Fooled by Digital Images., , , and . CoRR, (2015)Leveraging Shape, Reflectance and Albedo From Shading for Face Presentation Attack Detection., , , , , and . IEEE Trans. Inf. Forensics Secur., (2020)Urban mobility data to support the assessment of dynamic vulnerability to disasters., , , , and . ICT-DM, page 221-225. IEEE, (2015)Exposing Computer Generated Images by Eye's Region Classification via Transfer Learning of VGG19 CNN., , , , and . ICMLA, page 866-870. IEEE, (2017)Parkinson Disease Identification Using Residual Networks and Optimum-Path Forest., , , , , , and . SACI, page 325-330. IEEE, (2018)An RS-GIS-Based ComprehensiveImpact Assessment of Floods - A Case Study in Madeira River, Western Brazilian Amazon., , , , , , and . IEEE Geosci. Remote. Sens. Lett., 14 (9): 1614-1617 (2017)Exposing Computer Generated Images by Using Deep Convolutional Neural Networks., , , and . CoRR, (2017)FaceSpoof Buster: a Presentation Attack Detector Based on Intrinsic Image Properties and Deep Learning., , , , and . CoRR, (2019)Exposing Presentation Attacks by a Combination of Multi-intrinsic Image Properties, Convolutional Networks and Transfer Learning., , and . ACIVS, volume 12002 of Lecture Notes in Computer Science, page 153-165. Springer, (2020)Image Splicing Detection Through Illumination Inconsistencies and Deep Learning., , , , and . ICIP, page 3788-3792. IEEE, (2018)