Cited By
View all- Saadi ZSadiq AAkif OFarhan A(2024)A Survey: Security Vulnerabilities and Protective Strategies for Graphical PasswordsElectronics10.3390/electronics1315304213:15(3042)Online publication date: 1-Aug-2024
- Taneja NMishra GBhardwaj D(2024)A Bit-Plane Slicing Technique for the Classification of Anti-forensically Contrast-Enhanced Images2024 IEEE International Conference on Computing, Power and Communication Technologies (IC2PCT)10.1109/IC2PCT60090.2024.10486790(1619-1623)Online publication date: 9-Feb-2024
- Tan YLi YZeng LYe JWang WLi XEl Saddik AMei TCucchiara RBertini MTobon Vallejo DAtrey PHossain M(2023)Multi-scale Target-Aware Framework for Constrained Splicing Detection and LocalizationProceedings of the 31st ACM International Conference on Multimedia10.1145/3581783.3613763(8790-8798)Online publication date: 26-Oct-2023
- Show More Cited By