Author of the publication

Identification of Smartphone-Image Source and Manipulation.

, , , , , , , and . IEA/AIE, volume 7345 of Lecture Notes in Computer Science, page 262-271. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting embedding strength in audio steganography., , and . IEEE ICCI, page 925-930. IEEE Computer Society, (2010)Identification of Smartphone-Image Source and Manipulation., , , , , , , and . IEA/AIE, volume 7345 of Lecture Notes in Computer Science, page 262-271. Springer, (2012)Virtual machine auto-configuration for web application., and . IPCCC, page 333-334. IEEE Computer Society, (2010)Detecting information-hiding in WAV audios., , and . ICPR, page 1-4. IEEE Computer Society, (2008)Classification of Mass Spectrometry Data - Using Manifold and Supervised Distance Metric Learning., , , and . BIOSIGNALS, page 396-401. INSTICC Press, (2009)Merging Permission and API Features for Android Malware Detection., , and . IIAI-AAI, page 566-571. IEEE Computer Society, (2016)Spectrum Steganalysis of WAV Audio Streams., , and . MLDM, volume 5632 of Lecture Notes in Computer Science, page 582-593. Springer, (2009)Using Expanded Markov Process and Joint Distribution Features for JPEG Steganalysis., , , and . ICAART, page 226-231. INSTICC Press, (2009)Video Steganalysis Based on the Expanded Markov and Joint Distribution on the Transform Domains Detecting MSU StegoVideo., , and . ICMLA, page 671-674. IEEE Computer Society, (2008)Novel stream mining for audio steganalysis., , and . ACM Multimedia, page 95-104. ACM, (2009)