Author of the publication

Handbook of Digital Forensics of Multimedia Data and Devices

, and . chapter 4.2.4 Digital File Formats, page 137--138. John Wiley & Sons., (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection and classification of malicious patterns in network traffic using Benford's law., , , , , and . APSIPA, page 864-872. IEEE, (2017)Using a novel multiresolution hybrid matching method to improve stereo matching accuracy of satellite images., , and . VCIP, volume 4067 of Proceedings of SPIE, page 1024-1030. SPIE, (2000)Lost in the Digital Wild: Hiding Information in Digital Activities., , , and . MPS@CCS, page 27-37. ACM, (2018)Chatting Application Monitoring on Android System and its Detection based on the Correlation Test., , and . APSIPA, page 1556-1563. IEEE, (2018)Image Forensics of High Dynamic Range Imaging., , and . IWDW, volume 7128 of Lecture Notes in Computer Science, page 336-348. Springer, (2011)A Hybrid Watermarking Scheme for H.264/AVC Video., , , , and . ICPR (4), page 865-869. IEEE Computer Society, (2004)Improving classification accuracy in through-wall radar imaging using hybrid prony~s and singular value decomposition method., , and . IGARSS, page 4267-4270. IEEE, (2005)Large-scale multimedia signal processing for security and digital forensics SI 1163., , , and . Multim. Tools Appl., 80 (15): 23313-23317 (2021)Multi-attack Reference Hashing Generation for Image Authentication., , and . IWDW, volume 12022 of Lecture Notes in Computer Science, page 407-420. Springer, (2019)Advanced Information Technology Convergence 2017., , , , and . J. Electr. Comput. Eng., (2017)