Author of the publication

Digital image source coder forensics via intrinsic fingerprints.

, , , and . IEEE Trans. Inf. Forensics Secur., 4 (3): 460-475 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extrinsic Channel-Like Fingerprinting Overlays Using Subspace Embedding., , , and . IEEE Trans. Inf. Forensics Secur., 6 (4): 1355-1369 (2011)Behavior forensics with side information for multimedia fingerprinting social networks., , and . IEEE Trans. Inf. Forensics Secur., 4 (4): 911-927 (2009)Extrinsic Channel-Like Fingerprint Embedding for Authenticating MIMO Systems., , , and . IEEE Trans. Wirel. Commun., 10 (12): 4270-4281 (2011)Game-Theoretic Strategies and Equilibriums in Multimedia Fingerprinting Social Networks., , and . IEEE Trans. Multim., 13 (2): 191-205 (2011)Modulation forensics for wireless digital communications., and . ICASSP, page 1789-1792. IEEE, (2008)Digital image source coder forensics via intrinsic fingerprints., , , and . IEEE Trans. Inf. Forensics Secur., 4 (3): 460-475 (2009)Best-Effort Cooperative Relaying., , , and . IEEE Trans. Wirel. Commun., 10 (6): 1833-1843 (2011)Cooperation and Coalition in Multimedia Fingerprinting Colluder Social Networks., , and . IEEE Trans. Multim., 14 (3-2): 717-733 (2012)Undetectable image tampering through JPEG compression anti-forensics., , , and . ICIP, page 2109-2112. IEEE, (2010)Forensic identification of compressively sensed images., , , and . ICASSP, page 1837-1840. IEEE, (2012)