Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guest Editorial: Special Section on Security, Steganography, and Watermarking., and . J. Electronic Imaging, 15 (4): 041101 (2006)Digitale Wasserzeichen - Grundlagen, Verfahren, Anwendungsgebiete.. Xpert.press Springer, (2000)Joint watermarking of audio-visual data., and . MMSP, page 601-606. IEEE, (2001)Using Adapted Levenshtein Distance for On-Line Signature Authentication., , and . ICPR (2), page 931-934. IEEE Computer Society, (2004)Concept for Audio Quality and Security Assurance in Mobile Phones as Multimodal User Guides., , , and . AXMEDIS, page 337-340. IEEE Computer Society, (2006)Single-Semantic Multi-Instance Fusion of Handwriting Based Biometric Authentication Systems., , and . ICIP (2), page 393-396. IEEE, (2007)Mel-cepstrum-based steganalysis for VoIP steganography., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 650505. SPIE, (2007)Beyond mileage: Towards more secure techniques to assess the fitness levels of smart cars., , , and . ICCVE, page 149-154. IEEE, (2014)Combining digital watermarks and collusion-secure fingerprints for digital images., , , , , and . Security and Watermarking of Multimedia Contents, volume 3657 of SPIE Proceedings, page 171-183. SPIE, (1999)Finding meta data in speech and handwriting biometrics., , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 504-515. SPIE, (2005)