Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust DNN Watermarking via Fixed Embedding Weights with Optimized Distribution., , and . CoRR, (2022)Exploiting perceptual quality issues in countering SIFT-based Forensic methods., , , , and . ICASSP, page 2664-2668. IEEE, (2014)SIFT keypoint removal and injection for countering matching-based image forensics., , , and . IH&MMSec, page 123-130. ACM, (2013)Dealing with uncertainty in image forensics: A fuzzy approach., and . ICASSP, page 1753-1756. IEEE, (2012)Cnn-Based Detection of Generic Contrast Adjustment with Jpeg Post-Processing., , , and . ICIP, page 3803-3807. IEEE, (2018)A fuzzy approach to deal with uncertainty in image forensics., and . Signal Process. Image Commun., 27 (9): 998-1010 (2012)Exploring image dependencies: a new challenge in image forensics., , , , and . Media Forensics and Security, volume 7541 of SPIE Proceedings, page 75410X. SPIE, (2010)Detection of double AVC/HEVC encoding., and . EUSIPCO, page 2245-2249. IEEE, (2016)Boosting CNN-based primary quantization matrix estimation of double JPEG images via a classification-like architecture., , , and . CoRR, (2020)Identification of cut & paste tampering by means of double-JPEG detection and image segmentation., , and . ISCAS, page 1687-1690. IEEE, (2010)