Author of the publication

Seeing is not believing: visual verifications through liveness analysis using mobile devices.

, , and . ACSAC, page 239-248. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SensCrypt: A Secure Protocol for Managing Low Power Fitness Trackers., , and . ICNP, page 191-196. IEEE Computer Society, (2014)Natural Language Watermarking and Tamperproofing., , , , , , and . Information Hiding, volume 2578 of Lecture Notes in Computer Science, page 196-212. Springer, (2002)Liveness verifications for citizen journalism videos., , , and . WISEC, page 17:1-17:10. ACM, (2015)Information hiding through errors: a confusing approach., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 65050V. SPIE, (2007)A Secure Mobile Authentication Alternative to Biometrics., , and . ACSAC, page 28-41. ACM, (2017)A hierarchical protocol for increasing the stealthiness of steganographic methods., , , , , and . MM&Sec, page 16-24. ACM, (2004)ACE-Cost: Acquisition Cost Efficient Classifier by Hybrid Decision Tree with Local SVM Leaves., , and . MLDM, volume 6871 of Lecture Notes in Computer Science, page 60-74. Springer, (2011)Human Distinguishable Visual Key Fingerprints., , and . USENIX Security Symposium, page 2237-2254. USENIX Association, (2020)Attacks on lexical natural language steganography systems., , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 607209. SPIE, (2006)The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions., , and . MM&Sec, page 164-174. ACM, (2006)