Author of the publication

Revised benchmarking of contact-less fingerprint scanners for forensic fingerprint detection: challenges and results for chromatic white light scanners (CWL).

, , , , and . Multimedia on Mobile Devices / Multimedia Content Access: Algorithms and Systems, volume 7881 of SPIE Proceedings, page 78810G. SPIE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ForeMan, a Versatile and Extensible Database System for Digitized Forensics Based on Benchmarking Properties., , , and . IH&MMSec, page 91-96. ACM, (2015)Malicious fingerprint traces: a proposal for an automated analysis of printed amino acid dots using houghcircles., , , and . MM&Sec, page 33-40. ACM, (2011)Exemplarische Mensch-Maschine-Interaktionsszenarien und deren Komfort-, Safety- und Security-Implikationen am Beispiel von Gesicht und Sprache., , , and . Sicherheit, volume P-128 of LNI, page 315-327. GI, (2008)A semantic framework for a better understanding, investigation and prevention of organized financial crime., , , , , and . Sicherheit, volume P-256 of LNI, page 55-66. GI, (2016)Digital Forensics in Industrial Control Systems., , , and . SAFECOMP, volume 11698 of Lecture Notes in Computer Science, page 128-136. Springer, (2019)Benchmarking contact-less surface measurement devices for fingerprint acquisition in forensic investigations: Results for a differential scan approach with a chromatic white light sensor., , , , , and . DSP, page 1-6. IEEE, (2011)Revisiting Online Privacy and Security Mechanisms Applied in the In-App Payment Realm from the Consumers' Perspective., , , , , , , , and . ARES, page 135:1-135:12. ACM, (2022)Video surveillance: A new forensic model for the forensically sound retrival of picture content off a memory dump., , , and . GI Jahrestagung, volume P-154 of LNI, page 1619-1633. GI, (2009)Hidden in Plain Sight - Persistent Alternative Mass Storage Data Streams as a Means for Data Hiding With the Help of UEFI NVRAM and Implications for IT Forensics., , and . IH&MMSec, page 107-112. ACM, (2022)Data-Centric Examination Approach (DCEA) for a qualitative determination of error, loss and uncertainty in digital and digitised forensics.. Otto-von-Guericke University Magdeburg, Germany, (2020)