


default search action
Mustafa Ulutas
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j12]Gul Tahaoglu, Beste Ustubioglu
, Güzin Ulutas, Mustafa Ulutas, Vasif V. Nabiyev:
Robust Copy-Move Forgery Detection Technique Against Image Degradation and Geometric Distortion Attacks. Wirel. Pers. Commun. 131(4): 2919-2947 (2023) - 2022
- [j11]Gul Tahaoglu, Güzin Ulutas, Beste Ustubioglu
, Mustafa Ulutas, Vasif V. Nabiyev:
Ciratefi based copy move forgery detection on digital images. Multim. Tools Appl. 81(16): 22867-22902 (2022) - 2021
- [j10]Emre Gürbüz
, Güzin Ulutas, Mustafa Ulutas:
Source-destination discrimination on copy-move forgeries. Multim. Tools Appl. 80(8): 12831-12842 (2021)
2010 – 2019
- 2019
- [j9]Emre Gürbüz
, Güzin Ulutas, Mustafa Ulutas
:
Detection of Free-Form Copy-Move Forgery on Digital Images. Secur. Commun. Networks 2019: 8124521:1-8124521:14 (2019) - 2018
- [j8]Güzin Ulutas, Beste Ustubioglu
, Mustafa Ulutas
, Vasif V. Nabiyev:
Frame duplication detection based on BoW model. Multim. Syst. 24(5): 549-567 (2018) - [c27]Beste Ustubioglu
, Güzin Ulutas, Vasif V. Nabiyev, Mustafa Ulutas
, Arda Ustubioglu:
Using correlation matrix to detect frame duplication forgery in videos. SIU 2018: 1-4 - 2017
- [j7]Güzin Ulutas, Beste Ustubioglu
, Mustafa Ulutas
, Vasif V. Nabiyev:
Frame duplication/mirroring detection method with binary features. IET Image Process. 11(5): 333-342 (2017) - [j6]Güzin Ulutas, Arda Ustubioglu, Beste Ustubioglu
, Vasif V. Nabiyev, Mustafa Ulutas
:
Medical Image Tamper Detection Based on Passive Image Authentication. J. Digit. Imaging 30(6): 695-709 (2017) - [c26]Beste Ustubioglu
, Güzin Ulutas, Vasif V. Nabiyev, Mustafa Ulutas
, Arda Ustubioglu:
A fast detection method for frame duplication forgery based on correlation. SIU 2017: 1-4 - [c25]Mustafa Yazici, Mustafa Ulutas
:
Effect of noise and number of sensors on EEG source localization in dipole fitting method. SIU 2017: 1-4 - 2016
- [j5]Selcuk Cevher, Mustafa Ulutas
, Ibrahim Hökelek:
Enhancing Multiple Routing Configurations through systematic analysis of topological characteristics. Int. J. Netw. Manag. 26(3): 176-198 (2016) - [j4]Selcuk Cevher, Mustafa Ulutas
, Ibrahim Hökelek:
Topology-Aware Multiple Routing Configurations for Fault Tolerant Networking. J. Netw. Syst. Manag. 24(4): 944-973 (2016) - [c24]Selcuk Cevher, Mustafa Ulutas
, Sedat Altun, Ibrahim Hökelek:
Multi Topology Routing based IP Fast Re-Route for Software Defined Networks. ISCC 2016: 1224-1226 - [c23]Selcuk Cevher, Mustafa Ulutas
, Sedat Altun, Ibrahim Hökelek:
Multiple Routing Configurations for Fast Re-route in Software Defined Networks. SIU 2016: 993-996 - 2015
- [c22]Beste Ustubioglu
, Güzin Ulutas, Mustafa Ulutas
, Vasif V. Nabiyev, Arda Ustubioglu:
LBP-DCT Based Copy Move Forgery Detection Algorithm. ISCIS 2015: 127-136 - [c21]Selcuk Cevher, Mustafa Ulutas
, Ibrahim Hökelek:
An automated topological analysis of Multiple Routing Configurations. Sarnoff Symposium 2015: 99-104 - [c20]Beste Ustubioglu, Güzin Ulutas, Vasif V. Nabiyev, Mustafa Ulutas
:
Image forgery detection based on energy probability. SIU 2015: 919-922 - [c19]Arda Ustubioglu, Güzin Ulutas, Mustafa Ulutas
:
A new watermark algorithm resistance to geometric transformations. SIU 2015: 1525-1528 - [c18]Mustafa Bilgehan Imamoglu, Mustafa Ulutas
, Güzin Ulutas:
A watermarking technique for relational databases based on partitioning. SIU 2015: 2094-2097 - [c17]Mustafa Yazici, Mustafa Ulutas
:
Classification of EEG signals using time domain features. SIU 2015: 2358-2361 - [c16]Beste Ustubioglu
, Vasif V. Nabiyev, Güzin Ulutas, Mustafa Ulutas
:
Image forgery detection using colour moments. TSP 2015: 540-544 - [c15]Arda Ustubioglu, Güzin Ulutas, Mustafa Ulutas
:
DCT based image watermarking method with dynamic gain. TSP 2015: 550-554 - 2014
- [c14]Seyit Ahmet Guvenc, Mengu Demir, Mustafa Ulutas
:
Detection of forearm movements using wavelets and Adaptive Neuro-Fuzzy Inference System (ANFIS). INISTA 2014: 192-196 - [c13]Seniha Ketenci, Güzin Ulutas, Mustafa Ulutas:
Detection of duplicated regions in images using 1D-Fourier transform. IWSSIP 2014: 171-174 - [c12]Beste Gencturk, Vasif V. Nabiyev, Güzin Ulutas, Mustafa Ulutas
:
A hybrid image authentication method robust to JPEG attacks. SIU 2014: 1596-1599 - [c11]Mustafa Yazici, Mustafa Ulutas
:
Speaker identification with vector quantization and k-harmonic means. SIU 2014: 2134-2137 - [c10]Seyit Ahmet Guvenc, Mustafa Ulutas
, Mengu Demir:
Pattern recognition based analysis of arm EMG signals and classification with artificial neural networks. SIU 2014: 2209-2212 - 2013
- [j3]Mustafa Ulutas
, Güzin Ulutas, Vasif V. Nabiyev:
Invertible secret image sharing for gray level and dithered cover images. J. Syst. Softw. 86(2): 485-500 (2013) - [j2]Güzin Ulutas, Mustafa Ulutas
, Vasif V. Nabiyev:
Secret image sharing scheme with adaptive authentication strength. Pattern Recognit. Lett. 34(3): 283-291 (2013) - [c9]Selcuk Cevher, Mustafa Ulutas
, Ibrahim Hökelek:
Trade-off analysis of Multi Topology Routing based IP fast reroute mechanisms. INFOCOM Workshops 2013: 157-162 - [c8]Selcuk Cevher, Mustafa Ulutas
, Ibrahim Hökelek:
Trade-off analysis of multi topology routing based IP fast reroute mechanisms. INFOCOM 2013: 3447-3452 - [c7]Selcuk Cevher, Mustafa Ulutas
, Ibrahim Hökelek:
Performance evaluation of Multiple Routing Configurations. SIU 2013: 1-4 - [c6]Güzin Ulutas, Mustafa Ulutas
, Vasif V. Nabiyev:
Copy move forgery detection based on LBP. SIU 2013: 1-4 - 2012
- [c5]Güzin Ulutas, Mustafa Ulutas
, Vasif V. Nabiyev:
A new casccaded secret image sharing scheme. SIU 2012: 1-4 - 2011
- [j1]Mustafa Ulutas
, Güzin Ulutas, Vasif V. Nabiyev:
Medical image security and EPR hiding using Shamir's secret sharing scheme. J. Syst. Softw. 84(3): 341-353 (2011) - [c4]Güzin Ulutas, Mustafa Ulutas, Vasif V. Nabiyev:
Improved Secret Image Sharing Method By Encoding Shared Values With Authentication Bits. ISCIS 2011: 331-335 - [c3]Güzin Ulutas, Mustafa Ulutas
, Vasif V. Nabiyev:
Distortion free geometry based secret image sharing. WCIT 2011: 721-726
2000 – 2009
- 2009
- [c2]Güzin Ulutas, Vasif V. Nabiyev, Mustafa Ulutas
:
Polynomial approach in a secret image sharing using quadratic residue. ISCIS 2009: 586-591 - 2007
- [c1]Erdal Kiliç
, Okan Ozgonenel, Mustafa Ulutas
:
Fault Identification in Transformers through a Fuzzy Discrete Event System Approach. FUZZ-IEEE 2007: 1-6
1990 – 1999
- 1994
- [b1]Mustafa Ulutas:
Higher-order neural networks for invariant pattern recognition. Texas Tech University, Lubbock, USA, 1994
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:21 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint