Author of the publication

Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of Deceptions.

, , , , , and . Media Watermarking, Security, and Forensics, Society for Imaging Science and Technology, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Degenerate Bounded Errors-in-Variables Model., , , and . SIAM J. Matrix Anal. Appl., 23 (1): 138-166 (2001)Tree semi-separable matrices: a simultaneous generalization of sequentially and hierarchically semi-separable representations., and . CoRR, (2024)'Print and Scan' Resilient Data Hiding in Images., , , , and . IEEE Trans. Inf. Forensics Secur., 1 (4): 464-478 (2006)Steganalysis for Markov cover data with applications to images., , , and . IEEE Trans. Inf. Forensics Secur., 1 (2): 275-287 (2006)Detection of hiding in the least significant bit., , , , and . IEEE Trans. Signal Process., 52 (10): 3046-3058 (2004)Drums, curve descriptors and affine invariant region matching., , , , and . Image Vis. Comput., 26 (3): 347-360 (2008)An Eigenspace Update Algorithm for Image Analysis., , , , and . CVGIP: Graphical Model and Image Processing, 59 (5): 321-332 (1997)Statistical restoration for robust and secure steganography., , , , and . ICIP (2), page 1118-1121. IEEE, (2005)Fast algorithms for hierarchically semiseparable matrices., , , and . Numerical Lin. Alg. with Applic., 17 (6): 953-976 (2010)Determining Achievable Rates for Secure, Zero Divergence, Steganography., , , , and . ICIP, page 121-124. IEEE, (2006)