Author of the publication

Image Source Coding Forensics via Intrinsic Fingerprints.

, , , and . ICME, page 1127-1130. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scalable Multimedia Fingerprinting Forensics with Side Information., , and . ICIP, page 2293-2296. IEEE, (2006)Resistance analysis of scalable video fingerprinting systems under fair collusion attacks., and . ICIP (3), page 85-88. IEEE, (2005)Relay power allocation and pricing in multi-user relay networks using game theory., , and . ICASSP, page 2893-2896. IEEE, (2012)Iterative Double-Auction-Based Power Allocation in Multiuser Cooperative Networks., , and . IEEE Trans. Vehicular Technology, 64 (9): 4298-4303 (2015)Modeling Content Interaction in Information Diffusion with Pre-trained Sentence Embedding., , , and . APSIPA, page 499-507. IEEE, (2019)Modeling Multi-source Information Diffusion: A Graphical Evolutionary Game Approach., , , and . APSIPA, page 486-492. IEEE, (2019)Predicting success or failure of brace treatment for adolescents with idiopathic scoliosis., , , , , , , , , and . Medical Biol. Eng. Comput., 53 (10): 1001-1009 (2015)Time-sensitive behavior dynamics in multimedia fingerprinting social networks., , and . ICASSP, page 1465-1468. IEEE, (2009)Image Source Coding Forensics via Intrinsic Fingerprints., , , and . ICME, page 1127-1130. IEEE Computer Society, (2007)An efficient methodology to evaluate nanoscale circuit fault-tolerance performance based on belief propagation., , , , , and . ISCAS, page 608-611. IEEE, (2008)