From post

Photocopier forensics based on arbitrary text characters.

, , , и . Media Watermarking, Security, and Forensics, том 8665 из SPIE Proceedings, стр. 86650G. SPIE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Photocopier forensics based on arbitrary text characters., , , и . Media Watermarking, Security, and Forensics, том 8665 из SPIE Proceedings, стр. 86650G. SPIE, (2013)Source Cell-phone Identification Based on Multi-feature Fusion., , , , и . IPCV, стр. 590-596. CSREA Press, (2010)Information Security Game Analysis with Penalty Parameter., , , и . ISECS, стр. 453-456. IEEE Computer Society, (2008)Double Compression Detection Based on Markov Model of the First Digits of DCT Coefficients., , , и . ICIG, стр. 234-237. IEEE Computer Society, (2011)Effects on Statistical Features for Image by Quantization., , , , и . IIH-MSP, стр. 631-634. IEEE Computer Society, (2006)A New Feature-Based Method for Source Camera Identification., , и . IFIP Int. Conf. Digital Forensics, том 285 из IFIP, стр. 207-218. Springer, (2008)Electric network frequency estimation based on linear canonical transform for audio signal authentication., , , и . EUSIPCO, стр. 286-290. IEEE, (2017)Silhouette coefficient based approach on cell-phone classification for unknown source images., , , , и . ICC, стр. 6744-6747. IEEE, (2012)Laser Printer Source Forensics for Arbitrary Chinese Characters., , , , и . Security and Management, стр. 356-360. CSREA Press, (2010)Blind Copy-Paste Detection Using Improved SIFT Ring Descriptor., , и . IWDW, том 7128 из Lecture Notes in Computer Science, стр. 257-267. Springer, (2011)