Author of the publication

Document images forgery localization using a two-stream network.

, , , , , , and . Int. J. Intell. Syst., 37 (8): 5272-5289 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive cosine transform coding using marginal analysis., and . Visual Information Processing, volume 2488 of SPIE Proceedings, page 162-167. SPIE, (1995)A smart telemetry compression system for a space instrument: MARS-96 ELISMA instrument complex., , , , and . Microprocess. Microsystems, 20 (1): 17-30 (1996)Adaptive cosine transform coding for compression of Mars-96 ELISMA instrument data., and . Microprocess. Microsystems, 19 (5): 277-282 (1995)A fast-adaptive Huffman coding algorithm., and . IEEE Trans. Commun., 41 (4): 535-538 (1993)Data compression for space applications.. University of Sussex, Falmer, East Sussex, UK, (1992)British Library, EThOS.Evaluation of Vehicular Communication Networks in a Car Sharing System., , and . Int. J. Intell. Transp. Syst. Res., 11 (3): 113-119 (2013)Lightweight Encryption and Authentication for Controller Area Network of Autonomous Vehicles., , , , , , and . IEEE Trans. Veh. Technol., 72 (11): 14756-14770 (November 2023)Watermark-based digital fake image detection., and . Int. J. Comput. Appl. Technol., 38 (1/2/3): 113-117 (2010)Anti-gravity stem-seeking restoration algorithm for maize seed root image phenotype detection., , , , and . Comput. Electron. Agric., (2022)Integrity verification for scientific papers: The first exploration of the text., , , , and . Expert Syst. Appl., 237 (Part B): 121488 (March 2024)