Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Clustering with Jointly Learned Nonlinear Transforms Over Discriminating Min-Max Similarity/Dissimilarity Assignment., , , and . CoRR, (2019)Information bottleneck through variational glasses., , , , , and . CoRR, (2019)Correction: Mobile authentication of copy detection patterns., , , , , and . EURASIP J. Inf. Secur., 2023 (1): 8 (December 2023)Authentication of Copy Detection Patterns: A Pattern Reliability Based Approach., , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Hubble Meets Webb: Image-to-Image Translation in Astronomy., , , , , , and . Sensors, 24 (4): 1151 (February 2024)Forensic authentication of banknotes on mobile phones., , , and . Media Watermarking, Security, and Forensics, page 1-8. Society for Imaging Science and Technology, (2016)Geometrically robust perceptual fingerprinting: an asymmetric case., , , , and . Media Forensics and Security, volume 7880 of SPIE Proceedings, page 78800N. SPIE, (2011)Privacy enhancement of common randomness based authentication: Key rate maximized case., , , and . WIFS, page 86-90. IEEE, (2009)Active content fingerprinting: Shrinkage and lattice based modulations., , , and . ICASSP, page 3073-3077. IEEE, (2013)Private content identification: Performance-privacy-complexity trade-off., , , , and . MMSP, page 58-63. IEEE, (2010)