Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection, Attribution and Localization of GAN Generated Images., , , , , and . CoRR, (2020)SATTVA: SpArsiTy inspired classificaTion of malware VAriants., , and . IH&MMSec, page 135-140. ACM, (2015)Malware Detection Using Frequency Domain-Based Image Visualization and Deep Learning., , , , and . HICSS, page 1-10. ScholarSpace, (2021)Exploiting Spatial Structure for Localizing Manipulated Image Regions., , , , and . ICCV, page 4980-4989. IEEE Computer Society, (2017)Detection of seam carving and localization of seam insertions in digital images., , and . MM&Sec, page 107-116. ACM, (2009)Precise localization of key-points to identify local regions for robust data hiding., , and . ICIP, page 3681-3684. IEEE, (2010)Features we trust!, , and . ICIP, page 3476-3480. IEEE, (2015)Improving re-sampling detection by adding noise., , and . Media Forensics and Security, volume 7541 of SPIE Proceedings, page 75410I. SPIE, (2010)SeeTheSeams: Localized Detection of Seam Carving based Image Forgery in Satellite Imagery., , , , and . CoRR, (2021)Malware images: visualization and automatic classification., , , and . VizSEC, page 4. ACM, (2011)