Author of the publication

Nested object watermarking: comparison of block-luminance and blue channel LSB wet paper code image watermarking.

, and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 65050L. SPIE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Statistical latent fingerprint residue recognition in contact-less scans to support fingerprint segmentation., , and . DSP, page 1-6. IEEE, (2013)Capture and Analysis of Latent Marks., , and . Handbook of Biometrics for Forensic Science, Springer, (2017)Support Vector Machines for Dynamic Biometric Handwriting Classification., , , and . AIAI Workshops, volume 475 of CEUR Workshop Proceedings, page 118-125. CEUR-WS.org, (2009)Approximation of a Mathematical Aging Function for Latent Fingerprint Traces Based on First Experiments Using a Chromatic White Light (CWL) Sensor and the Binary Pixel Aging Feature., , and . Communications and Multimedia Security, volume 7025 of Lecture Notes in Computer Science, page 59-71. Springer, (2011)Proposal of Non-invasive Fingerprint Age Determination to Improve Data Privacy Management in Police Work from a Legal Perspective Using the Example of Germany., , , and . DPM/SETOP, volume 7731 of Lecture Notes in Computer Science, page 61-74. Springer, (2012)Biometric User Authentication for it Security - From Fundamentals to Handwriting. Advances in Information Security Springer, (2006)Biosecure reference systems for on-line signature verification: A study of complementarity., , , , , , , , , and 5 other author(s). Annales des Télécommunications, 62 (1-2): 36-61 (2007)Resource-efficient latent fingerprint age estimation for Adhoc crime scene forensics: Quality assessment of flat bed scans and statistical features., , and . IPTA, page 1-6. IEEE, (2016)Audio watermark attacks: from single to profile attacks., , , and . MM&Sec, page 39-50. ACM, (2005)Nested object watermarking: from the rectangular con-straint to polygonal and private annotations., and . MM&Sec, page 187-194. ACM, (2007)