Author of the publication

Exposing Digital Forgeries by Detecting a Contextual Violation Using Deep Neural Networks.

, , , and . WISA, volume 10763 of Lecture Notes in Computer Science, page 16-24. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cropping-resilient 3D mesh watermarking based on consistent segmentation and mesh steganalysis., , , , , , and . Multim. Tools Appl., 77 (5): 5685-5712 (2018)Learning deep features for source color laser printer identification based on cascaded learning., , and . Neurocomputing, (2019)Learning deep features for source color laser printer identification based on cascaded learning., , and . CoRR, (2017)Robust video watermarking for MPEG compression and DA-AD conversion., , , , and . IWIHC@AsiaCCS, page 2-8. ACM, (2014)Localization of diffusion model-based inpainting through the inter-intra similarity of frequency features., , and . Image Vis. Comput., (2024)Separable KLT for Intra Coding in Versatile Video Coding (VVC)., , , , , , and . DCC, page 571. IEEE, (2019)Identifying photorealistic computer graphics using convolutional neural networks., , , , , and . ICIP, page 4093-4097. IEEE, (2017)Convolutional Neural Network Architecture for Recovering Watermark Synchronization., , , and . Sensors, 20 (18): 5427 (2020)Exposing Digital Forgeries by Detecting a Contextual Violation Using Deep Neural Networks., , , and . WISA, volume 10763 of Lecture Notes in Computer Science, page 16-24. Springer, (2017)Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye., , , and . IH&MMSec, page 169-174. ACM, (2016)