Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Joint watermarking of audio-visual data., and . MMSP, page 601-606. IEEE, (2001)Guest Editorial: Special Section on Security, Steganography, and Watermarking., and . J. Electronic Imaging, 15 (4): 041101 (2006)Digitale Wasserzeichen - Grundlagen, Verfahren, Anwendungsgebiete.. Xpert.press Springer, (2000)Using Adapted Levenshtein Distance for On-Line Signature Authentication., , and . ICPR (2), page 931-934. IEEE Computer Society, (2004)Sequence detection of overlapping latent fingerprints using a short-term aging feature., , and . WIFS, page 85-90. IEEE, (2012)Concept for Audio Quality and Security Assurance in Mobile Phones as Multimodal User Guides., , , and . AXMEDIS, page 337-340. IEEE Computer Society, (2006)A High-Capacity Block Based Video Watermark., , , and . EUROMICRO, page 457-460. IEEE Computer Society, (2004)Single-Semantic Multi-Instance Fusion of Handwriting Based Biometric Authentication Systems., , and . ICIP (2), page 393-396. IEEE, (2007)Invertible authentication for 3D meshes., and . Security and Watermarking of Multimedia Contents, volume 5020 of SPIE Proceedings, page 653-664. SPIE, (2003)Mel-cepstrum-based steganalysis for VoIP steganography., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 650505. SPIE, (2007)