Author of the publication

Enhanced perceptual image authentication with tamper localization and self-restoration.

, , , , and . ICME, page 1-6. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From data flows to privacy-benefit trade-offs: A user-centric semantic model., and . Secur. Priv., (2022)Deepfake: Definitions, Performance Metrics and Standards, Datasets and Benchmarks, and a Meta-Review., , and . CoRR, (2022)A Comprehensive Survey of Natural Language Generation Advances from the Perspective of Digital Deception., , , , and . CoRR, (2022)Proof of Swarm Based Ensemble Learning for Federated Learning Applications., , , and . SAC, page 152-155. ACM, (2023)Building multimedia security applications in the MPEG reconfigurable video coding (RVC) framework., , , and . MM&Sec, page 121-130. ACM, (2011)jCAPTCHA: Accessible Human Validation., , and . ICCHP (1), volume 8547 of Lecture Notes in Computer Science, page 129-136. Springer, (2014)Enhanced perceptual image authentication with tamper localization and self-restoration., , , , and . ICME, page 1-6. IEEE Computer Society, (2014)A New Approach to Commutative Watermarking-Encryption., , , and . Communications and Multimedia Security, volume 7394 of Lecture Notes in Computer Science, page 117-130. Springer, (2012)How National CSIRTs Operate: Personal Observations and Opinions from MyCERT., , , and . DSC, page 1-2. IEEE, (2022)The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter., , and . ICWSM Workshops, (2021)