Author of the publication

Toward the identification of DSLR lenses by chromatic aberration.

, , and . Media Forensics and Security, volume 7880 of SPIE Proceedings, page 788010. SPIE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protocols for data hiding in pseudo-random state., , and . Media Forensics and Security, volume 7254 of SPIE Proceedings, page 72540W. SPIE, (2009)Toward the identification of DSLR lenses by chromatic aberration., , and . Media Forensics and Security, volume 7880 of SPIE Proceedings, page 788010. SPIE, (2011)A Hands-On Mobile Device Forensics Course in Cybersecurity Education.. TALE, page 1-5. IEEE, (2021)A supraliminal channel in a wireless phone application., and . MM&Sec, page 151-154. ACM, (2009)Capacity Limits of Pseudorandom Channels in Deception Problems., , and . IEEE Trans. Inf. Forensics Secur., 10 (9): 1824-1834 (2015)Enhancing Teaching Effectiveness in Mobile Application Development with Structured Practice., and . TALE, page 1-5. IEEE, (2019)ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection and Classification., , , and . IEEE Trans. Inf. Forensics Secur., (2024)Robust Image Steganography: Hiding Messages in Frequency Coefficients., , , , and . AAAI, page 14955-14963. AAAI Press, (2023)Robust data hiding for JPEG images with invertible neural network., , , , and . Neural Networks, (2023)A Supraliminal Channel in a Videoconferencing Application., , , and . Information Hiding, volume 5284 of Lecture Notes in Computer Science, page 283-293. Springer, (2008)