Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information bottleneck through variational glasses., , , , , and . CoRR, (2019)Correction: Mobile authentication of copy detection patterns., , , , , and . EURASIP J. Inf. Secur., 2023 (1): 8 (December 2023)Forensic authentication of banknotes on mobile phones., , , and . Media Watermarking, Security, and Forensics, page 1-8. Society for Imaging Science and Technology, (2016)Geometrically robust perceptual fingerprinting: an asymmetric case., , , , and . Media Forensics and Security, volume 7880 of SPIE Proceedings, page 78800N. SPIE, (2011)Privacy enhancement of common randomness based authentication: Key rate maximized case., , , and . WIFS, page 86-90. IEEE, (2009)Active content fingerprinting: Shrinkage and lattice based modulations., , , and . ICASSP, page 3073-3077. IEEE, (2013)Injecting Image Priors into Learnable Compressive Subsampling., , , , and . EUSIPCO, page 1735-1739. IEEE, (2018)Private content identification: Performance-privacy-complexity trade-off., , , , and . MMSP, page 58-63. IEEE, (2010)Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns., , , , , , and . WIFS, page 1-6. IEEE, (2022)Machine learning attack on copy detection patterns: are $11$ patterns cloneable?, , , , , and . WIFS, page 1-6. IEEE, (2021)