Author of the publication

A Method for Identifying Origin of Digital Images Using a Convolutional Neural Network.

, , , , and . APSIPA, page 1293-1299. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mix-ORAM: Using delegate shuffles., , and . CoRR, (2017)Preventing unauthorized copying of displayed information by utilizing differences in spectral sensitivity between humans and imaging devices., , and . WIFS, page 145-150. IEEE, (2012)On Privacy-compliant Disclosure of Personal Data to Third Parties using Digital Watermarking., , , and . J. Inf. Hiding Multim. Signal Process., 2 (3): 270-281 (2011)Isolation in Cloud Computing and Privacy-Enhancing Technologies - Suitability of Privacy-Enhancing Technologies for Separating Data Usage in Business Processes., , and . Bus. Inf. Syst. Eng., 3 (3): 155-162 (2011)OpenForensics: Large-Scale Challenging Dataset For Multi-Face Forgery Detection And Segmentation In-The-Wild., , , and . ICCV, page 10097-10107. IEEE, (2021)How Close Are Other Computer Vision Tasks to Deepfake Detection?, , and . IJCB, page 1-10. IEEE, (2023)Mix-ORAM: Using Delegated Shuffles., , and . WPES@CCS, page 51-61. ACM, (2017)Use of invisible noise signals to prevent privacy invasion through face recognition from camera images., , and . ACM Multimedia, page 1315-1316. ACM, (2012)A QR Symbol with ECDSA for Both Public and Secret Areas using Rhombic Sub-cells., , and . APSIPA, page 1392-1399. IEEE, (2020)Detection of Adversarial Examples Based on Sensitivities to Noise Removal Filter., , , , and . APSIPA, page 1386-1391. IEEE, (2020)