Author of the publication

SIFT-Symmetry: A robust detection method for copy-move forgery with reflection attack.

, , , , and . J. Vis. Commun. Image Represent., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LocPass: A Graphical Password Method to Prevent Shoulder-Surfing., , , , and . Symmetry, 11 (10): 1252 (2019)Emergency vehicle preemption system based on global positioning system (GPS), A-star (A*) algorithm and FPGA., , , , and . Comput. Syst. Sci. Eng., (2013)Energy harvesting and battery power based routing in wireless sensor networks., , , , and . Wireless Networks, 23 (1): 249-266 (2017)Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities., , , , , , and . IEEE Access, (2020)Review on Security of Internet of Things Authentication Mechanism, , , , , , , , and . IEEE Access, (2019)Investigation of Fusion Features for Apple Classification in Smart Manufacturing., , , and . Symmetry, 11 (10): 1194 (2019)Passive video forgery detection techniques: A survey., , , , , and . IAS, page 29-34. IEEE, (2014)Empirical Study of Sperm Swarm Optimization Algorithm., , and . IntelliSys (2), volume 869 of Advances in Intelligent Systems and Computing, page 1082-1104. Springer, (2018)An automatic zone detection system for safe landing of UAVs., , , , , , and . Expert Syst. Appl., (2019)Heterogeneous Energy and Traffic Aware Sleep-Awake Cluster-Based Routing Protocol for Wireless Sensor Network., , , , , and . IEEE Access, (2020)