Author of the publication

Copy move forgery detection based on keypoint and patch match.

, , , , , , and . Multimedia Tools Appl., 78 (22): 31387-31413 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

pathWave: Combined estimation of network link capacity and available bandwidth using statistical signal processing., , , , and . ICON, page 1-6. IEEE, (2008)Systematic co-optimization from chip design, process technology to systems for GPU AI chip., , , , , and . VLSI-DAT, page 1-2. IEEE, (2018)Directional self-learning of genetic algorithm., , , and . GECCO, page 1569-1570. ACM, (2005)A 1-2-MHz 150-400-V GaN-Based Isolated DC-DC Bus Converter With Monolithic Slope-Sensing ZVS Detection., and . IEEE J. Solid State Circuits, 53 (12): 3434-3445 (2018)Proactive Hybrid-Granularity Slot Allocation for Flexible Ethernet., , , , and . IEEE Trans. Netw. Serv. Manag., 21 (1): 372-388 (February 2024)Maximizing the Use of Environmental Constraints: A Pushing-Based Hybrid Position/Force Assembly Skill for Contact-Rich Tasks., , , , , , , , and . CoRR, (2022)A new Private Mutual Authentication scheme with group discovery., , , and . J. Inf. Secur. Appl., (September 2023)Estimation of oil thickness and aging from hyperspectral signature., , and . SSIAI, page 213-216. IEEE Computer Society, (2012)Inverse Optimality of Predictor Feedbacks for Linearizable Strict-Feedforward Systems with Input Delays., , , , and . ACC, page 3336-3341. IEEE, (2018)GMDSS Operation Intelligent Evaluation Based on Tree Digraph., , , and . SPML, page 13-18. ACM, (2022)