Author of the publication

Photo Forensics: There is More to a Picture Than Meets the Eye.

. IWSPA@CODASPY, page 35. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Content Authentication for Neural Imaging Pipelines: End-to-end Optimization of Photo Provenance in Complex Distribution Channels., and . CoRR, (2018)Circuits and systems for real-time security and copyright protection of multimedia., , and . Comput. Electr. Eng., 35 (2): 231-234 (2009)A 2-D vector excitation coding technique.. Signal Process., 67 (2): 163-172 (1998)Lossless compression of multispectral image data., , and . IEEE Trans. Geosci. Remote. Sens., 32 (2): 282-289 (1994)Detecting the Presence of ENF Signal in Digital Videos: A Superpixel-Based Approach., , and . IEEE Signal Process. Lett., 24 (10): 1463-1467 (2017)An efficient key predistribution scheme for ad hoc network security., and . IEEE J. Sel. Areas Commun., 23 (3): 611-621 (2005)On the security of the digest function in the SARI image authentication system., and . IEEE Trans. Circuits Syst. Video Technol., 12 (11): 1030-1033 (2002)SAFE-OPS: An approach to embedded software security., , , , and . ACM Trans. Embed. Comput. Syst., 4 (1): 189-210 (2005)Design of a Laboratory for Information Security Education., , , and . World Conference on Information Security Education, volume 253 of IFIP Conference Proceedings, page 61-73. Kluwer, (2003)Every Shred Helps: Assembling Evidence From Orphaned JPEG Fragments., , and . IEEE Trans. Inf. Forensics Secur., 14 (9): 2372-2386 (2019)