Author of the publication

Fragmented JPEG File Recovery Using Pseudo Headers.

, , , , , , , and . IFIP Int. Conf. Digital Forensics, volume 462 of IFIP Advances in Information and Communication Technology, page 215-231. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improved Biometric Template Protection Method based on Non-Uniform Quantization., , and . J. Digit. Inf. Manag., 6 (2): 168-173 (2008)Dual Watermarking for Image Tamper Detection and Self-Recovery., , , and . IIH-MSP, page 33-36. IEEE, (2013)Sierpinski triangle based data center architecture in cloud computing., , , , and . J. Supercomput., 69 (2): 887-907 (2014)On random routing in wireless sensor grids: A mathematical model for rendezvous probability and performance optimization., , and . J. Parallel Distributed Comput., 71 (3): 369-380 (2011)WiFi based communication and localization of an autonomous mobile robot for refinery inspection., , , , , and . ICRA, page 4490-4495. IEEE, (2015)Multipoint communications with speech mixing over IP network., , , and . Comput. Commun., 25 (1): 46-55 (2002)The research about safety culture dissemination via ICB model., , , and . IECON, page 7503-7508. IEEE, (2017)Saliency based SIFT keypoints filtration., , , , , and . ICDIP, volume 8334 of SPIE Proceedings, page 833415. SPIE, (2012)Modeling and Simulation of Practical Quantum Secure Communication Network., , , and . CoRR, (2019)Demystifying Local Vision Transformer: Sparse Connectivity, Weight Sharing, and Dynamic Weight., , , , , , and . CoRR, (2021)