Author of the publication

Remote Sensing Data Copy-Move Forgery Protection Algorithm.

. ICCVG, volume 9972 of Lecture Notes in Computer Science, page 544-552. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Shape of Learning: Anisotropy and Intrinsic Dimensions in Transformer-Based Models., , , , , and . CoRR, (2023)GHOST - A New Face Swap Approach for Image and Video Domains., , , , and . IEEE Access, (2022)A Copy-Move Detection Algorithm Based on Geometric Local Binary Pattern.. TIWDC, volume 766 of Communications in Computer and Information Science, page 73-83. Springer, (2017)Satellite Image Forgery Detection Based on Buildings Shadows Analysis., and . AIST, volume 10716 of Lecture Notes in Computer Science, page 231-236. Springer, (2017)A Copy-Move Detection Algorithm Using Binary Gradient Contours., and . ICIAR, volume 9730 of Lecture Notes in Computer Science, page 349-357. Springer, (2016)Your Transformer is Secretly Linear., , , , , , and . ACL (1), page 5376-5384. Association for Computational Linguistics, (2024)Using Efficient Linear Local Features in the Copy-Move Forgery Detection Task., and . AIST, volume 661 of Communications in Computer and Information Science, page 305-313. (2016)Person reidentification on video surveillance data.. ICMV, volume 11041 of SPIE Proceedings, page 110410P. SPIE, (2018)Camera Sensor Traces Analysis in Image Forgery Detection Problem.. ICCVG, volume 11114 of Lecture Notes in Computer Science, page 453-463. Springer, (2018)An Approach for Developing a Mobile Accessed Music Search Integration Platform., , and . FedCSIS, page 267-273. (2013)