Author of the publication

Identification of Smartphone-Image Source and Manipulation.

, , , , , , , and . IEA/AIE, volume 7345 of Lecture Notes in Computer Science, page 262-271. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A scalable framework for discovering coherent co-clusters in noisy data., , , , and . ICML, volume 382 of ACM International Conference Proceeding Series, page 241-248. ACM, (2009)A Study on Enhanced Dynamic Signature Verification for the Embedded System., , and . BVAI, volume 3704 of Lecture Notes in Computer Science, page 436-446. Springer, (2005)Data Transformation for Sum Squared Residue.. PAKDD (1), volume 6118 of Lecture Notes in Computer Science, page 48-55. Springer, (2010)Synthesis of GBSB-based Neural Associative Memories Using Evolution Program, , and . (1999)Scalable Implementations of Rough Set Algorithms: A Survey., , and . IEA/AIE, volume 10868 of Lecture Notes in Computer Science, page 648-660. Springer, (2018)Identification of Smartphone-Image Source and Manipulation., , , , , , , and . IEA/AIE, volume 7345 of Lecture Notes in Computer Science, page 262-271. Springer, (2012)Network Attack Detection Using an Unsupervised Machine Learning Algorithm., , and . HICSS, page 1-10. ScholarSpace, (2020)BrowStEx: A tool to aggregate browser storage artifacts for forensic analysis., , , , and . Digit. Investig., (2015)On the Design of BSB Neural Associative Memories Using Semidefinite Programming, and . Neural Computation, (1999)Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation., , , , , , , , and . Appl. Intell., 39 (4): 705-726 (2013)