Author of the publication

A Novel Copy-Move Forgery Detection Algorithm via Gradient-Hash Matching and Simplified Cluster-Based Filtering.

, , , , and . Int. J. Pattern Recognit. Artif. Intell., 37 (6): 2350011:1-2350011:38 (May 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity., and . ICISS, volume 5905 of Lecture Notes in Computer Science, page 101-116. Springer, (2009)Complexity of Checking Freshness of Cryptographic Protocols., and . ICISS, volume 5352 of Lecture Notes in Computer Science, page 86-101. Springer, (2008)Improving Techniques for Proving Undecidability of Checking Cryptographic Protocols., and . ARES, page 1067-1074. IEEE Computer Society, (2008)Model Checking Using Tabled Rewriting.. IJCAR Doctoral Programme, volume 106 of CEUR Workshop Proceedings, CEUR-WS.org, (2004)A Point Cloud Upsampling Adversarial Network Based on Residual Multi-Scale Off-Set Attention., , , , , and . Virtual Real. Intell. Hardw., 5 (1): 81-91 (February 2023)A Novel Copy-Move Forgery Detection Algorithm via Gradient-Hash Matching and Simplified Cluster-Based Filtering., , , , and . Int. J. Pattern Recognit. Artif. Intell., 37 (6): 2350011:1-2350011:38 (May 2023)Tropical cyclone trajectory based on satellite remote sensing prediction and time attention mechanism ConvLSTM model., , , , , and . Big Data Res., (2024)A New Method of Controlling IoT Devices Based on Cloud Storage Service., and . AIMS@SERVICES, page 113-116. IEEE Computer Society, (2017)