Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast identification algorithms for forensic applications., , , and . WIFS, page 76-80. IEEE, (2009)Towards reproducible results in authentication based on physical non-cloneable functions: The forensic authentication microstructure optical set (FAMOS)., , , , and . WIFS, page 43-48. IEEE, (2012)Statistical analysis of digital image fingerprinting based on random projections., , , , and . ISPA, page 200-205. IEEE, (2011)Conception and limits of robust perceptual hashing: towards side information assisted hash functions., , , and . Media Forensics and Security, volume 7254 of SPIE Proceedings, page 72540D. SPIE, (2009)Privacy amplification of content identification systems based on fingerprint bit reliability., , , , and . WIFS, page 1-6. IEEE, (2010)Statistical analysis of binarized SIFT descriptors., , , and . ISPA, page 460-465. IEEE, (2011)Private content identification based on soft fingerprinting., , , , and . Media Forensics and Security, volume 7880 of SPIE Proceedings, page 78800M. SPIE, (2011)Random projections based item authentication., , , and . Media Forensics and Security, volume 7254 of SPIE Proceedings, page 725413. SPIE, (2009)Secure surface identification codes., , , , and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 68190D. SPIE, (2008)Fast physical object identification based on unclonable features and soft fingerprinting., , , and . ICASSP, page 1713-1716. IEEE, (2011)