Author of the publication

Fingerprint Forensics Application Protocol: Semi-automated Modeling and Verification of Watermark-Based Communication Using CASPER and FDR.

, , , , , and . IWDW, volume 7128 of Lecture Notes in Computer Science, page 321-335. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mel-cepstrum-based steganalysis for VoIP steganography., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 650505. SPIE, (2007)A semantic framework for a better understanding, investigation and prevention of organized financial crime., , , , , and . Sicherheit, volume P-256 of LNI, page 55-66. GI, (2016)Generalized Benford's Law for Blind Detection of Morphed Face Images., , , and . IH&MMSec, page 49-54. ACM, (2018)WLAN steganography revisited., , and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 681903. SPIE, (2008)Considerations on the benchmarking of media forensics., and . EUSIPCO, page 61-65. IEEE, (2015)Cover signal specific steganalysis: the impact of training on the example of two selected audio steganalysis approaches., and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 68190Y. SPIE, (2008)Reducing the False Alarm Rate for Face Morph Detection by a Morph Pipeline Footprint Detector., , and . EUSIPCO, page 1002-1006. IEEE, (2018)Extending a context model for microphone forensics., , and . Media Watermarking, Security, and Forensics, volume 8303 of SPIE Proceedings, page 83030S. SPIE, (2012)A Face Morphing Detection Concept with a Frequency and a Spatial Domain Feature Space for Images on eMRTD., , and . IH&MMSec, page 95-100. ACM, (2019)Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing., , , , and . IH&MMSec, page 21-32. ACM, (2017)