Author of the publication

Blind Copy-Paste Detection Using Improved SIFT Ring Descriptor.

, , and . IWDW, volume 7128 of Lecture Notes in Computer Science, page 257-267. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Photocopier forensics based on arbitrary text characters., , , and . Media Watermarking, Security, and Forensics, volume 8665 of SPIE Proceedings, page 86650G. SPIE, (2013)Source Cell-phone Identification Based on Multi-feature Fusion., , , , and . IPCV, page 590-596. CSREA Press, (2010)Information Security Game Analysis with Penalty Parameter., , , and . ISECS, page 453-456. IEEE Computer Society, (2008)Double Compression Detection Based on Markov Model of the First Digits of DCT Coefficients., , , and . ICIG, page 234-237. IEEE Computer Society, (2011)Effects on Statistical Features for Image by Quantization., , , , and . IIH-MSP, page 631-634. IEEE Computer Society, (2006)Generalized transfer component analysis for mismatched JPEG steganalysis., , , , and . ICIP, page 4432-4436. IEEE, (2013)Source Camera Identification Using Support Vector Machines., , and . IFIP Int. Conf. Digital Forensics, volume 306 of IFIP Advances in Information and Communication Technology, page 107-118. Springer, (2009)Blind Copy-Paste Detection Using Improved SIFT Ring Descriptor., , and . IWDW, volume 7128 of Lecture Notes in Computer Science, page 257-267. Springer, (2011)Model Semantic Relations with Extended Attributes., , , , and . ICPR, page 2549-2554. IEEE Computer Society, (2014)Document forgery detection using distortion mutation of geometric parameters in characters., , and . J. Electronic Imaging, 24 (2): 023008 (2015)