Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A SIFT-based forensic method for copy-move attack detection and transformation recovery, , , , and . IEEE Trans. on Information Forensics and Security, 6 (3): 1099--1110 (September 2011)Geometric tampering estimation by means of a SIFT-based forensic analysis, , , , and . Proc. of IEEE Int'l Conference on Acoustics, Speech, and Signal Processing (ICASSP), Dallas, TX, USA, (March 2010)(Oral, Accept Rate 15%).Copy-Move Forgery Detection and Localization by Means of Robust Clustering with J-Linkage, , , , , and . Signal Processing: Image Communication, 28 (6): 659--669 (July 2013)Paying More Attention to Saliency: Image Captioning with Saliency and Context Attention., , , and . ACM Trans. Multim. Comput. Commun. Appl., 14 (2): 48:1-48:21 (2018)An Indoor Location-Aware System for an IoT-Based Smart Museum., , , , , , and . IEEE Internet of Things Journal, 3 (2): 244-253 (2016)Motion Segmentation using Visual and Bio-mechanical Features., , and . ACM Multimedia, page 476-480. ACM, (2016)On the effectiveness of local warping against SIFT-based copy-move detection., , , , , and . ISCCSP, page 1-5. IEEE, (2012)Personalized Egocentric Video Summarization for Cultural Experience., , and . ICMR, page 539-542. ACM, (2015)Egocentric Object Tracking: An Odometry-Based Solution., , and . ICIAP (2), volume 9280 of Lecture Notes in Computer Science, page 687-696. Springer, (2015)Local Pyramidal Descriptors for Image Recognition., , , and . IEEE Trans. Pattern Anal. Mach. Intell., 36 (5): 1033-1040 (2014)