Author of the publication

Supporting Forensic Design - A Course Profile to Teach Forensics.

, , and . IMF, page 85-95. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Adapted Levenshtein Distance for On-Line Signature Authentication., , and . ICPR (2), page 931-934. IEEE Computer Society, (2004)A High-Capacity Block Based Video Watermark., , , and . EUROMICRO, page 457-460. IEEE Computer Society, (2004)Single-Semantic Multi-Instance Fusion of Handwriting Based Biometric Authentication Systems., , and . ICIP (2), page 393-396. IEEE, (2007)Sequence detection of overlapping latent fingerprints using a short-term aging feature., , and . WIFS, page 85-90. IEEE, (2012)Digitale Wasserzeichen - Grundlagen, Verfahren, Anwendungsgebiete.. Xpert.press Springer, (2000)Guest Editorial: Special Section on Security, Steganography, and Watermarking., and . J. Electronic Imaging, 15 (4): 041101 (2006)Joint watermarking of audio-visual data., and . MMSP, page 601-606. IEEE, (2001)Concept for Audio Quality and Security Assurance in Mobile Phones as Multimodal User Guides., , , and . AXMEDIS, page 337-340. IEEE Computer Society, (2006)Watermarking-Based Digital Audio Data Authentication., and . EURASIP J. Adv. Sig. Proc., 2003 (10): 1001-1015 (2003)Automotive IT-Security as a Challenge: Basic Attacks from the Black Box Perspective on the Example of Privacy Threats., , and . SAFECOMP, volume 5775 of Lecture Notes in Computer Science, page 145-158. Springer, (2009)