Mustafa Ulutas

Orcid: 0000-0001-8876-9591

According to our database1, Mustafa Ulutas authored at least 39 papers between 1994 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Robust Copy-Move Forgery Detection Technique Against Image Degradation and Geometric Distortion Attacks.
Wirel. Pers. Commun., 2023

2022
Ciratefi based copy move forgery detection on digital images.
Multim. Tools Appl., 2022

2021
Source-destination discrimination on copy-move forgeries.
Multim. Tools Appl., 2021

2019
Detection of Free-Form Copy-Move Forgery on Digital Images.
Secur. Commun. Networks, 2019

2018
Frame duplication detection based on BoW model.
Multim. Syst., 2018

Using correlation matrix to detect frame duplication forgery in videos.
Proceedings of the 26th Signal Processing and Communications Applications Conference, 2018

2017
Medical Image Tamper Detection Based on Passive Image Authentication.
J. Digit. Imaging, 2017

Frame duplication/mirroring detection method with binary features.
IET Image Process., 2017

Effect of noise and number of sensors on EEG source localization in dipole fitting method.
Proceedings of the 25th Signal Processing and Communications Applications Conference, 2017

A fast detection method for frame duplication forgery based on correlation.
Proceedings of the 25th Signal Processing and Communications Applications Conference, 2017

2016
Topology-Aware Multiple Routing Configurations for Fault Tolerant Networking.
J. Netw. Syst. Manag., 2016

Enhancing Multiple Routing Configurations through systematic analysis of topological characteristics.
Int. J. Netw. Manag., 2016

Multiple Routing Configurations for Fast Re-route in Software Defined Networks.
Proceedings of the 24th Signal Processing and Communication Application Conference, 2016

Multi Topology Routing based IP Fast Re-Route for Software Defined Networks.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

2015
DCT based image watermarking method with dynamic gain.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Image forgery detection using colour moments.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Classification of EEG signals using time domain features.
Proceedings of the 2015 23nd Signal Processing and Communications Applications Conference (SIU), 2015

A new watermark algorithm resistance to geometric transformations.
Proceedings of the 2015 23nd Signal Processing and Communications Applications Conference (SIU), 2015

Image forgery detection based on energy probability.
Proceedings of the 2015 23nd Signal Processing and Communications Applications Conference (SIU), 2015

A watermarking technique for relational databases based on partitioning.
Proceedings of the 2015 23nd Signal Processing and Communications Applications Conference (SIU), 2015

An automated topological analysis of Multiple Routing Configurations.
Proceedings of the 36th IEEE Sarnoff Symposium 2015, Newark, NJ, USA, 2015

LBP-DCT Based Copy Move Forgery Detection Algorithm.
Proceedings of the Information Sciences and Systems 2015, 2015

2014
Speaker identification with vector quantization and k-harmonic means.
Proceedings of the 2014 22nd Signal Processing and Communications Applications Conference (SIU), 2014

Pattern recognition based analysis of arm EMG signals and classification with artificial neural networks.
Proceedings of the 2014 22nd Signal Processing and Communications Applications Conference (SIU), 2014

A hybrid image authentication method robust to JPEG attacks.
Proceedings of the 2014 22nd Signal Processing and Communications Applications Conference (SIU), 2014

Detection of duplicated regions in images using 1D-Fourier transform.
Proceedings of the International Conference on Systems, Signals and Image Processing, 2014

Detection of forearm movements using wavelets and Adaptive Neuro-Fuzzy Inference System (ANFIS).
Proceedings of the 2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications, 2014

2013
Secret image sharing scheme with adaptive authentication strength.
Pattern Recognit. Lett., 2013

Invertible secret image sharing for gray level and dithered cover images.
J. Syst. Softw., 2013

Copy move forgery detection based on LBP.
Proceedings of the 21st Signal Processing and Communications Applications Conference, 2013

Performance evaluation of Multiple Routing Configurations.
Proceedings of the 21st Signal Processing and Communications Applications Conference, 2013

Trade-off analysis of Multi Topology Routing based IP fast reroute mechanisms.
Proceedings of the 2013 Proceedings IEEE INFOCOM Workshops, 2013

2012
A new casccaded secret image sharing scheme.
Proceedings of the 20th Signal Processing and Communications Applications Conference, 2012

2011
Distortion free geometry based secret image sharing.
Proceedings of the First World Conference on Information Technology, 2011

Medical image security and EPR hiding using Shamir's secret sharing scheme.
J. Syst. Softw., 2011

Improved Secret Image Sharing Method By Encoding Shared Values With Authentication Bits.
Proceedings of the Computer and Information Sciences II, 2011

2009
Polynomial approach in a secret image sharing using quadratic residue.
Proceedings of the 24th International Symposium on Computer and Information Sciences, 2009

2007
Fault Identification in Transformers through a Fuzzy Discrete Event System Approach.
Proceedings of the FUZZ-IEEE 2007, 2007

1994
Higher-order neural networks for invariant pattern recognition.
PhD thesis, 1994


  Loading...