Author of the publication

AI-Based Compression: A New Unintended Counter Attack on JPEG-Related Image Forensic Detectors?

, and . ICIP, page 3426-3430. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Editorial announcement.. EURASIP J. Image Video Process., (2011)Adversarial attacks through architectures and spectra in face recognition., , , and . Pattern Recognit. Lett., (2021)Differential methods for the identification of 2D and 3D motion models in image sequences., and . Signal Process. Image Commun., 7 (1): 105-127 (1995)Editorial., and . EURASIP J. Adv. Signal Process., 2003 (1): 3-4 (2003)Eyebrow Movement Analysis over Real-Time Video Sequences for Synthetic Representation., and . AMDO, volume 2492 of Lecture Notes in Computer Science, page 213-225. Springer, (2002)Texture-based watermarking of 3D video objects., and . IEEE Trans. Circuits Syst. Video Techn., 13 (8): 853-866 (2003)Image watermaking for owner and content authentication., and . ACM Multimedia, page 471-472. ACM, (2000)Analysis and Reproduction of Facial Expressions for Realistic Communicating Clones., , and . VLSI Signal Processing, 29 (1-2): 41-49 (2001)A Multi-Site Teleconferencing System Using V. R. Paradigms., and . ECMAST, volume 1242 of Lecture Notes in Computer Science, page 359-374. Springer, (1997)A Data Mapping Method for Steganography and Its Application to Images., , and . Information Hiding, volume 5284 of Lecture Notes in Computer Science, page 236-250. Springer, (2008)