Author of the publication

Transform Coder Classification for Digital Image Forensics.

, , and . ICIP (6), page 105-108. IEEE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Advances in cognitive radio networks: A survey., and . J. Sel. Topics Signal Processing, 5 (1): 5-23 (2011)Best-effort cooperative communication without dedicated relays., , and . ICASSP, page 3230-3233. IEEE, (2010)Multiplicative update rules for nonnegative matrix factorization with co-occurrence constraints., and . ICASSP, page 449-452. IEEE, (2010)Anti-forensics of JPEG compression., , , and . ICASSP, page 1694-1697. IEEE, (2010)Authenticating MIMO Transmissions Using Channel-Like Fingerprinting., , , and . GLOBECOM, page 1-6. IEEE, (2010)Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes., , and . IEEE Trans. Dependable Sec. Comput., 4 (3): 228-242 (2007)A joint channel estimation and unequal error protection scheme for video transmission in OFDM systems., , and . ICIP (1), page 549-552. IEEE, (2002)Channel aware unequal error protection for image transmission over broadband wireless LAN., , and . ICIP (1), page 93-96. IEEE, (2003)JET: dynamic join-exit-tree amortization and scheduling for contributory key management., , , and . IEEE/ACM Trans. Netw., 14 (5): 1128-1140 (2006)A Multi-layer 2-D Adaptive Filtering Architecture Based on McClellan Transformation., and . ISCAS, page 1999-2002. IEEE, (1993)