Author of the publication

MPEG recompression detection based on block artifacts.

, , and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 68190X. SPIE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk., and . IEEE Signal Process. Lett., 23 (1): 169-173 (2016)Detection of double compression with the same bit rate in MPEG-2 videos., , and . ChinaSIP, page 306-309. IEEE, (2014)Audio watermarking robust to geometrical distortions based on dyadic wavelet transform., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 65050A. SPIE, (2007)CDMA-based watermarking resisting to cropping., , and . ISCAS (2), page 25-28. IEEE, (2004)Automatic Steganographic Distortion Learning Using a Generative Adversarial Network., , , and . IEEE Signal Process. Lett., 24 (10): 1547-1551 (2017)Enhancing ROC performance of trustworthy camera source identification., , , and . Media Forensics and Security, volume 7880 of SPIE Proceedings, page 788009. SPIE, (2011)Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization., and . IEEE Trans. Inf. Forensics Secur., 12 (4): 809-824 (2017)New Channel Selection Rule for JPEG Steganography., , and . IEEE Trans. Inf. Forensics Secur., 7 (4): 1181-1191 (2012)Binary Image Steganalysis Based on Histogram of Structuring Elements., , , , , and . IEEE Trans. Circuits Syst. Video Technol., 30 (9): 3081-3094 (2020)A note on the Ate pairing., , and . Int. J. Inf. Sec., 7 (6): 379-382 (2008)