Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guilloche Detection for ID Authentication: A Dataset and Baselines., , , , , and . MMSP, page 1-6. IEEE, (2023)Vitranspad: Video Transformer Using Convolution And Self-Attention For Face Presentation Attack Detection., , , , , and . ICIP, page 4248-4252. IEEE, (2022)CheckScan: a reference hashing for identity document quality detection., , and . ICMV, volume 12084 of SPIE Proceedings, page 120840J. SPIE, (2021)Authentication of Holograms with Mixed Patterns by Direct LBP Comparison., , and . MMSP, page 1-6. IEEE, (2023)IDTrust: Deep Identity Document Quality Detection with Bandpass Filtering., , , , , and . CoRR, (2024)Robust and Imperceptible Watermarking Scheme for GWAS Data Traceability., , , and . IWDW, volume 13825 of Lecture Notes in Computer Science, page 147-161. Springer, (2022)Robust Hashing for Character Authentication and Retrieval Using Deep Features and Iterative Quantization., , , , and . ICDAR Workshops (1), volume 12916 of Lecture Notes in Computer Science, page 466-481. Springer, (2021)Watermarking approaches for images authentication in applications with time constraints. (Approches de tatouage pour l'authentification de l'image dans des applications à contraintes temporelles).. University of Western Brittany, Brest, France, (2018)