Author of the publication

Passive detection of image forgery using DCT and local binary pattern.

, , , , , and . Signal Image Video Process., 11 (1): 81-88 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NIE: An Approach for Extracting Information from Narrative Web Information Sources., and . iiWAS, volume 170 of books@ocg.at, Austrian Computer Society, (2003)Innovative Mobile Information Systems: Insights from Gulf Cooperation Countries and All Over the World., , and . Mob. Inf. Syst., (2016)Selection criteria for text mining approaches., , and . Comput. Hum. Behav., (2015)Breaking the F5 Algorith: An Improved Approach., , , and . Egypt. Comput. Sci. J., 29 (1): 1-9 (2007)Formalization and Verification of Relational Database Normal Forms Using the Gamma Framework.. J. King Saud Univ. Comput. Inf. Sci., (2009)Passive detection of image forgery using DCT and local binary pattern., , , , , and . Signal Image Video Process., 11 (1): 81-88 (2017)Smart systems approach for development of explicit congestion marking and traffic engineering model for Diffserv/MPLS networks., , , , and . J. Ambient Intell. Humaniz. Comput., 14 (12): 15971-15981 (December 2023)On the Structure of the Boolean Satisfiability Problem: A Survey., , and . ACM Comput. Surv., 55 (3): 46:1-46:34 (2023)An M2M gateway-centric architecture for autonomic healing and optimising of machine-to-machine overlay networks., , , and . Int. J. Ad Hoc Ubiquitous Comput., 26 (1): 12-28 (2017)Self-learning Mobile Robot Navigation in Unknown Environment Using Evolutionary Learning., , , , and . J. Univers. Comput. Sci., 20 (10): 1459-1468 (2014)