Author of the publication

Image tampering localization via estimating the non-aligned double JPEG compression.

, , , and . Media Watermarking, Security, and Forensics, volume 8665 of SPIE Proceedings, page 86650R. SPIE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Framework for Early Pitting Fault Diagnosis of Rotating Machinery Based on Dilated CNN Combined With Spatial Dropout., , , , and . IEEE Access, (2021)A Novel Adversarial One-Shot Cross-Domain Network for Machinery Fault Diagnosis With Limited Source Data., , , and . IEEE Trans. Instrum. Meas., (2022)Integrating SIP with F-HMIPv6 to Enhance End-to-End QoS in Next Generation Networks., , , and . ICSS, volume 240 of Advances in Intelligent Systems and Computing, page 715-725. Springer, (2013)Part-Based Deep Hashing for Large-Scale Person Re-Identification., , , , and . IEEE Trans. Image Processing, 26 (10): 4806-4817 (2017)Steganalysis on Internet images via domain adaptive classifier., , , , and . Neurocomputing, (2019)JPEG quantization table mismatched steganalysis via robust discriminative feature transformation., , , and . Media Watermarking, Security, and Forensics, volume 9409 of SPIE Proceedings, page 94090U. SPIE, (2015)Semantic consistency hashing for cross-modal retrieval., , , and . Neurocomputing, (2016)Laser Printer Source Forensics for Arbitrary Chinese Characters., , , , and . Security and Management, page 356-360. CSREA Press, (2010)Amplitude-adaptive spread-spectrum data embedding., , , , and . IET Image Processing, 10 (2): 138-148 (2016)Multi-View Analysis Dictionary Learning for Image Classification., , , , and . IEEE Access, (2018)