Author of the publication

A Feature Extracting Method for Tamper Detection in Printed Documents.

, , and . ICE-B, page 429-432. INSTICC Press, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of Audio Watermark System Using Short Detection Time Frame., , , , and . IIH-MSP, page 44-47. IEEE Computer Society, (2009)Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis., , , , , , , and . Security Protocols Workshop, volume 2133 of Lecture Notes in Computer Science, page 238-248. Springer, (2000)A Feature Extracting Method for Tamper Detection in Printed Documents., , and . ICE-B, page 429-432. INSTICC Press, (2008)Third-party approach to controlling digital copiers., , , , , and . iiWAS, page 686-688. ACM, (2008)INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds., , , , , , and . Security Protocols Workshop, volume 1796 of Lecture Notes in Computer Science, page 195-207. Springer, (1999)The Estimation of the New Feature Extracting Method for Tamper Detection in Printed Documents., , and . PACIIA (2), page 43-47. IEEE Computer Society, (2008)978-0-7695-3490-9.A study on user authentication infrastructure for next generation telematics., , , and . ICVES, page 38-44. IEEE, (2008)Internet-Marks: the secure seal for WWW site authentication., , , , , , , and . ICPADS Workshops, page 393-398. IEEE Computer Society, (2000)