From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CDMA-based watermarking resisting to cropping., , и . ISCAS (2), стр. 25-28. IEEE, (2004)Enhancing ROC performance of trustworthy camera source identification., , , и . Media Forensics and Security, том 7880 из SPIE Proceedings, стр. 788009. SPIE, (2011)Detection of double compression with the same bit rate in MPEG-2 videos., , и . ChinaSIP, стр. 306-309. IEEE, (2014)Audio watermarking robust to geometrical distortions based on dyadic wavelet transform., , и . Security, Steganography, and Watermarking of Multimedia Contents, том 6505 из SPIE Proceedings, стр. 65050A. SPIE, (2007)Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images., и . IEEE Trans. Image Processing, 25 (3): 1312-1326 (2016)Detecting double compressed AMR audio using deep learning., , и . ICASSP, стр. 2669-2673. IEEE, (2014)Verification of hidden speaker behind transformation disguised voices., , и . Digit. Signal Process., (2015)One-Class Double Compression Detection of Advanced Videos Based on Simple Gaussian Distribution Model., , , , и . IEEE Trans. Circuits Syst. Video Technol., 32 (4): 2496-2500 (2022)Poster: Query-efficient Black-box Attack for Image Forgery Localization via Reinforcement Learning., , , и . CCS, стр. 3552-3554. ACM, (2023)New JPEG Steganographic Scheme with High Security Performance., , и . IWDW, том 6526 из Lecture Notes in Computer Science, стр. 189-201. Springer, (2010)