Author of the publication

Cropping-resilient 3D mesh watermarking based on consistent segmentation and mesh steganalysis.

, , , , , , and . Multim. Tools Appl., 77 (5): 5685-5712 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting composite image manipulation based on deep neural networks., , , , , , and . IWSSIP, page 1-5. IEEE, (2017)Median Filtered Image Restoration and Anti-Forensics Using Adversarial Networks., , , , and . IEEE Signal Process. Lett., 25 (2): 278-282 (2018)Hue modification estimation using sensor pattern noise., , and . ICIP, page 5287-5291. IEEE, (2014)A robust 3D mesh watermarking scheme against cropping., , , , and . IC3D, page 1-6. IEEE, (2015)Exposing Digital Forgeries by Detecting a Contextual Violation Using Deep Neural Networks., , , and . WISA, volume 10763 of Lecture Notes in Computer Science, page 16-24. Springer, (2017)Perceptual 3D Watermarking Using Mesh Saliency., , , , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 315-322. Springer, (2017)Fingerprint Spoof Detection Using Contrast Enhancement and Convolutional Neural Networks., , , , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 331-338. Springer, (2017)Blind 3D mesh watermarking based on cropping-resilient synchronization., , , and . Multimedia Tools Appl., 76 (24): 26695-26721 (2017)DeepPore: Fingerprint Pore Extraction Using Deep Convolutional Neural Networks., , , , and . IEEE Signal Process. Lett., 24 (12): 1808-1812 (2017)Cropping-resilient 3D mesh watermarking based on consistent segmentation and mesh steganalysis., , , , , , and . Multim. Tools Appl., 77 (5): 5685-5712 (2018)