Author of the publication

SIFT-Symmetry: A robust detection method for copy-move forgery with reflection attack.

, , , , and . J. Vis. Commun. Image Represent., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis and Design of Low-Cost Bit-Serial Architectures for Motion Estimation in H.264/AVC., , and . J. Signal Process. Syst., 71 (2): 111-121 (2013)Protection of Binding Update Message in Mobile IPv6., , , and . EMS, page 444-447. IEEE, (2012)A Cost-Efficient Bit-Serial Architecture for Sub-pixel Motion Estimation of H.264/AVC., , and . IIH-MSP, page 818-821. IEEE Computer Society, (2008)A comprehensive evaluation procedure for copy-move forgery detection methods: results from a systematic review., , , , and . Multim. Tools Appl., 81 (11): 15171-15203 (2022)The Evolution of Android Malware and Android Analysis Techniques., , , , and . ACM Comput. Surv., 49 (4): 76:1-76:41 (2017)A survey of secure protocols in Mobile IPv6., , , and . J. Netw. Comput. Appl., (2014)The rise of "malware": Bibliometric analysis of malware study., , , and . J. Netw. Comput. Appl., (2016)Mobile Botnet Attacks: A Thematic Taxonomy., , and . WorldCIST (2), volume 276 of Advances in Intelligent Systems and Computing, page 153-164. Springer, (2014)Best Path Cluster-Based Routing Protocol for Wireless Sensor Networks., , and . UKSim, page 663-667. IEEE, (2013)Hardware Design of On-Line Jawi Character Recognition Chip using Discrete Wavelet Transform., , and . ICDAR, page 91-95. IEEE Computer Society, (2005)