Author of the publication

Secure Cloud-Based Image Tampering Detection and Localization Using POB Number System.

, , , and . TOMM, 13 (3): 23:1-23:23 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effective multimedia surveillance using a human-centric approach., , and . Multim. Tools Appl., 51 (2): 697-721 (2011)Coopetitive visual surveillance using model predictive control., and . VSSN@MM, page 149-158. ACM, (2005)Secure cloud-based medical data visualization., , and . ACM Multimedia, page 1105-1108. ACM, (2012)A Secure and Privacy-Aware Cloud-Based Architecture for Online Social Networks., and . MIWAI, volume 8271 of Lecture Notes in Computer Science, page 223-234. Springer, (2013)Audio Based Event Detection for Multimedia Surveillance., , and . ICASSP (5), page 813-816. IEEE, (2006)Secure Computing of GPS Trajectory Similarity: A Review., , and . LocalRec@SIGSPATIAL, page 3:1-3:7. ACM, (2018)Analysis of Comparators for Binary Watermarks., , , and . CVIP (2), volume 460 of Advances in Intelligent Systems and Computing, page 399-410. Springer, (2016)Automatic scheduling of CCTV camera views using a human-centric approach., , and . ICME, page 325-328. IEEE Computer Society, (2008)Functionality Delegation in Distributed Surveillance Systems., , , and . AVSS, page 72-79. IEEE Computer Society, (2010)Cyberbullying detection using probabilistic socio-textual information fusion., , and . ASONAM, page 884-887. IEEE Computer Society, (2016)