Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

We Need No Pixels: Video Manipulation Detection Using Stream Descriptors., , , , and . CoRR, (2019)First Steps Toward Camera Model Identification With Convolutional Neural Networks., , , , , and . IEEE Signal Process. Lett., 24 (3): 259-263 (2017)Antiforensic synthesis of motion vectors using template algorithms., , , and . ICASSP, page 2709-2713. IEEE, (2014)Design of projection matrices for PRNU compression., , , and . WIFS, page 1-6. IEEE, (2017)Unsupervised feature learning for bootleg detection using deep learning architectures., , , , and . WIFS, page 131-136. IEEE, (2014)A Geometrical-Statistical approach to outlier removal for TDOA measuments., , , , , , and . CoRR, (2016)An In-Depth Study on Open-Set Camera Model Identification., , , , and . CoRR, (2019)Ballistic Ground Penetrating Radar Equipment for Blast-Exposed Security Applications., , , , , and . Remote Sensing, 12 (4): 717 (2020)Image phylogeny through dissimilarity metrics fusion., , , , , and . EUVIP, page 1-6. IEEE, (2014)Improving PRNU Compression Through Preprocessing, Quantization, and Coding., , , and . IEEE Trans. Inf. Forensics Secur., 14 (3): 608-620 (2019)