Author of the publication

Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation.

, , , , , , , , and . Appl. Intell., 39 (4): 705-726 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of Advanced Ensemble Learning Techniques for Android Malware Detection., and . Vietnam. J. Comput. Sci., 7 (02): 145-159 (2020)Online Fraud Detection System Based on Non-Stationery Anomaly Detection., , and . Security and Management, page 364-370. CSREA Press, (2005)Distributed Multi-Intelligent Agent Framework for Detection of Stealthy Probes., , and . HIS, volume 105 of Frontiers in Artificial Intelligence and Applications, page 779-788. IOS Press, (2003)Behaviour Mining for Fraud Detection., , and . J. Res. Pract. Inf. Technol., 39 (1): 3-18 (2007)Predicting embedding strength in audio steganography., , and . IEEE ICCI, page 925-930. IEEE Computer Society, (2010)Fraud Detection System Based on Behavior Mining and Anomaly Detection., , , and . IICAI, page 3487-3501. IICAI, (2005)Identification of Smartphone-Image Source and Manipulation., , , , , , , and . IEA/AIE, volume 7345 of Lecture Notes in Computer Science, page 262-271. Springer, (2012)Detecting Coordinated Distributed Multiple Attacks., , , and . AINA Workshops (1), page 557-562. IEEE Computer Society, (2007)Host IP Obfuscation and Performance Analysis., and . ICR, volume 721 of Lecture Notes in Networks and Systems, page 245-255. Springer, (2023)Dependance of critical dimension on learning machines and ranking methods., , and . IRI, page 738-739. IEEE, (2012)