Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Leak in PRNU Based Source Identification - Questioning Fingerprint Uniqueness., , and . IEEE Access, (2021)A Proposed Workflow for the Restoration of Image Artifacts in Forensic Applications., , , , , , and . IEEE Access, (2024)Second-Order Statistics Analysis to Cope With Contrast Enhancement Counter-Forensics., , , , and . IEEE Signal Process. Lett., 22 (8): 1132-1136 (2015)Universal Counterforensics of Multiple Compressed JPEG Images., , and . IWDW, volume 9023 of Lecture Notes in Computer Science, page 31-46. Springer, (2014)The maven project: Management and Authenticity Verification of multimedia contents., , , , , , , , , and 4 other author(s). ICME Workshops, page 1-4. IEEE Computer Society, (2015)Countering anti-forensics by means of data fusion., , , and . Media Watermarking, Security, and Forensics, volume 9028 of SPIE Proceedings, page 90280Z. SPIE, (2014)Reversible watermarking for image integrity verification in hierarchical PACS., , , , , , and . MM&Sec, page 161-168. ACM, (2010)Localization of forgeries in MPEG-2 video through GOP size and DQ analysis., , , , , , and . MMSP, page 494-499. IEEE, (2013)A Forensic Tool for Investigating Image Forgeries., , , , and . Int. J. Digit. Crime Forensics, 5 (4): 15-33 (2013)Unsupervised fusion for forgery localization exploiting background information., , , , , and . ICME Workshops, page 1-6. IEEE Computer Society, (2015)