Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Dataset for Forensic Analysis of Videos in the Wild., , , , and . TIWDC, volume 766 of Communications in Computer and Information Science, page 84-94. Springer, (2017)A Hybrid Approach to Video Source Identification., , , and . CoRR, (2017)A privacy-preserving protocol for neural-network-based computation., , and . MM&Sec, page 146-151. ACM, (2006)Efficient pointwise and blockwise encrypted operations., , and . MM&Sec, page 85-90. ACM, (2008)Multi-Clue Reconstruction of Sharing Chains for Social Media Images., , , , , , and . IEEE Trans. Multim., (2023)Multi-clue reconstruction of sharing chains for social media images., , , , , , and . CoRR, (2021)VISION: a video and image dataset for source identification., , , , and . EURASIP J. Information Security, (2017)Oblivious Neural Network Computing via Homomorphic Encryption., , and . EURASIP J. Information Security, (2007)Design and Analysis of the First BOWS Contest., and . EURASIP J. Information Security, (2007)Effectiveness of ST-DM Watermarking Against Intra-video Collusion., , , and . IWDW, volume 3710 of Lecture Notes in Computer Science, page 158-170. Springer, (2005)