Author of the publication

Blind image clustering based on the Normalized Cuts criterion for camera identification.

, , , , and . Signal Process. Image Commun., 29 (8): 831-843 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smartphones Identification Through the Built-In Microphones With Convolutional Neural Network., and . IEEE Access, (2019)Media Forensics and the Challenge of Big Data (Dagstuhl Seminar 23021)., , , and . Dagstuhl Reports, 13 (1): 1-35 (January 2023)Online Distributed Denial of Service (DDoS) intrusion detection based on adaptive sliding window and morphological fractal dimension., and . Comput. Networks, (2022)Convolutional neural networks combined with feature selection for radio-frequency fingerprinting., , , and . Comput. Intell., 39 (5): 734-758 (October 2023)Media forensics on social media platforms: a survey., , and . EURASIP J. Inf. Secur., 2021 (1): 4 (2021)Forensic Analysis of SIFT Keypoint Removal and Injection., , , and . IEEE Trans. Inf. Forensics Secur., 9 (9): 1450-1464 (2014)An Evaluation of Entropy Measures for Microphone Identification., and . Entropy, 22 (11): 1235 (2020)Dealing with video source identification in social networks., , , , , and . Signal Process. Image Commun., (2017)DepthFake: A Depth-Based Strategy for Detecting Deepfake Videos., , , and . ICPR Workshops (4), volume 13646 of Lecture Notes in Computer Science, page 17-31. Springer, (2022)Tracing images back to their social network of origin: A CNN-based approach., , and . WIFS, page 1-6. IEEE, (2017)