Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance comparison of denoising filters for source camera identification., , , and . Media Forensics and Security, volume 7880 of SPIE Proceedings, page 788007. SPIE, (2011)Automatic Synchronization of Multi-User Photo Galleries., , , , , and . CoRR, (2016)Contactless approach for heart rate estimation for QoE assessment., , , , , and . Signal Process. Image Commun., (2019)Jointly exploiting visual and non-visual information for event-related social media retrieval., , , and . ICMR, page 159-166. ACM, (2013)Detecting Morphological Filtering of Binary Images., and . IEEE Trans. Inf. Forensics Secur., 12 (5): 1207-1217 (2017)GA-Based Robustness Evaluation Method for Digital Image Watermarking., , and . IWDW, volume 5041 of Lecture Notes in Computer Science, page 294-307. Springer, (2007)Teaching Multimedia Data Protection Through an International Online Competition., , , and . IEEE Trans. Educ., 54 (3): 381-386 (2011)A commutative digital image watermarking and encryption method in the tree structured Haar transform domain., , , , , and . Signal Process. Image Commun., 26 (1): 1-12 (2011)TrueFace: a Dataset for the Detection of Synthetic Face Images from Social Networks., , , , and . IJCB, page 1-7. IEEE, (2022)A Crowdsourced Data Set of Edited Images Online., , , , and . CrowdMM, page 49-52. ACM, (2014)