Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Resampling Supplemented with Noise Inconsistencies Analysis for Image Forensics., and . ICCSA Workshops, page 546-556. IEEE Computer Society, (2008)A cyclostationarity analysis applied to image forensics., and . WACV, page 1-6. IEEE Computer Society, (2009)On Periodic Properties of Interpolation and Their Application To Image Authentication., and . IAS, page 439-446. IEEE Computer Society, (2007)Image tampering detection using methods based on JPEG compression artifacts: a real-life experiment., and . ISABEL, page 176:1-176:5. ACM, (2011)Detecting double compressed JPEG images., and . ICDP, page 1-6. IET / IEEE, (2009)Determination of Stop-Criterion for Incremental Methods Constructing Camera Sensor Fingerprint., , and . IWDW, volume 9023 of Lecture Notes in Computer Science, page 47-59. Springer, (2014)Identification of aliasing-based patterns in re-captured LCD screens., , and . ICIP, page 616-620. IEEE, (2015)Detection and description of geometrically transformed digital images., and . Media Forensics and Security, volume 7254 of SPIE Proceedings, page 72540J. SPIE, (2009)Identifying image forgeries using change points detection., and . Media Forensics and Security, volume 7880 of SPIE Proceedings, page 788008. SPIE, (2011)Detection of Near-Duplicated Image Regions., and . Computer Recognition Systems 2, volume 45 of Advances in Soft Computing, Springer, (2008)