Author of the publication

Security analysis for biometric data in ID documents.

, , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 474-485. SPIE, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Watermark Detection Using Spomf., and . ICIP (1), page 316-319. (1999)Optimal distortion compensation for quantization watermarking., , and . ICIP (2), page 727-730. (2003)How to Achieve Robustness Against Scaling in a Real-Time Digital Watermarking System for Broadcast Monitoring., , , , , , , and . ICIP, page 407-410. (2000)Detecting electronic watermarks in digital video., , and . ICASSP, page 2071-2074. IEEE Computer Society, (1999)Phase-Domain Statistical Analysis for Audio Source Localization., , and . MMSP, page 94-97. IEEE, (2007)A marriage made in heaven: cryptography and watermarking?. MMSP, page 6. IEEE, (2004)Exploiting Shift Invariance to Obtain a High Payload in Digital Image Watermarking., , , and . ICMCS, Vol. 1, page 7-12. IEEE Computer Society, (1999)On optimal boundary and transition filters in time-varying filter banks.. ICIP (1), page 625-628. (1996)Security for biometric data., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 642-652. SPIE, (2004)Exhaustive geometrical search and the false positive watermark detection probability., , , and . Security and Watermarking of Multimedia Contents, volume 5020 of SPIE Proceedings, page 203-214. SPIE, (2003)