Author of the publication

Visibility enhancement and validation of segmented latent fingerprints in crime scene forensics.

, , , , and . Media Watermarking, Security, and Forensics, volume 8665 of SPIE Proceedings, page 866508. SPIE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generalized Benford's Law for Blind Detection of Morphed Face Images., , , and . IH&MMSec, page 49-54. ACM, (2018)An Overview of Recent Advances in Assessing and Mitigating the Face Morphing Attack., and . EUSIPCO, page 1017-1021. IEEE, (2018)Visibility Assessment of Latent Fingerprints on Challenging Substrates in Spectroscopic Scans., , , and . Communications and Multimedia Security, volume 8099 of Lecture Notes in Computer Science, page 200-203. Springer, (2013)User discrimination in automotive systems., , , and . Image Processing: Algorithms and Systems, volume 7870 of SPIE Proceedings, page 78700J. SPIE, (2011)Handwriting Biometrics: Feature Selection Based Improvements in Authentication and Hash Generation Accuracy., , and . BIOID, volume 6583 of Lecture Notes in Computer Science, page 37-48. Springer, (2011)Exemplarische Mensch-Maschine-Interaktionsszenarien und deren Komfort-, Safety- und Security-Implikationen am Beispiel von Gesicht und Sprache., , , and . Sicherheit, volume P-128 of LNI, page 315-327. GI, (2008)Forensic analysis: on the capability of optical sensors to visualize latent fingerprints on rubber gloves., , , and . IWBF, page 1-6. IEEE, (2015)Driver/passenger discrimination for the interaction with the dual-view touch screen integrated to the automobile centre console., , , and . Image Processing: Algorithms and Systems / Parallel Processing for Imaging Applications, volume 8295 of SPIE Proceedings, page 82950W. SPIE, (2012)BioSecure Signature Evaluation Campaign (ESRA'2011): evaluating systems on quality-based categories of skilled forgeries., , , , , , , , , and 11 other author(s). IJCB, page 1-10. IEEE Computer Society, (2011)Improving Reliability of Biometric Hash Generation through the Selection of Dynamic Handwriting Features., , and . Trans. Data Hiding and Multimedia Security, (2012)