Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generation of Privacy-friendly Datasets of Latent Fingerprint Images using Generative Adversarial Networks., , , , and . VISIGRAPP (4: VISAPP), page 345-352. SCITEPRESS, (2021)A semantic framework for a better understanding, investigation and prevention of organized financial crime., , , , , and . Sicherheit, volume P-256 of LNI, page 55-66. GI, (2016)Semi-automated communication protocol security verification for watermarking - pros and cons illustrated on a complex application scenario., , , , and . MM&Sec, page 93-102. ACM, (2011)Design and evaluation of security multimedia warnings for children's smartphones., , , , and . Multimedia on Mobile Devices / Multimedia Content Access: Algorithms and Systems, volume 8304 of SPIE Proceedings, page 83040B. SPIE, (2012)Reducing the False Alarm Rate for Face Morph Detection by a Morph Pipeline Footprint Detector., , and . EUSIPCO, page 1002-1006. IEEE, (2018)Media Forensics Considerations on DeepFake Detection with Hand-Crafted Features., , , and . J. Imaging, 7 (7): 108 (2021)Evaluation of binary pixel aging curves of latent fingerprint traces for different surfaces using a chromatic white light (CWL) sensor., , , , and . MM&Sec, page 41-50. ACM, (2011)Explainability and Interpretability for Media Forensic Methods: Illustrated on the Example of the Steganalysis Tool Stegdetect., and . VISIGRAPP (4): VISAPP, page 585-592. SCITEPRESS, (2024)Printed fingerprints: a framework and first results towards detection of artificially printed latent fingerprints for forensics., , , , and . IQSP, volume 7867 of SPIE Proceedings, page 78670U. SPIE, (2011)A Semi-Automated HTTP Traffic Analysis for Online Payments for Empowering Security, Forensics and Privacy Analysis., , , and . ARES, page 61:1-61:8. ACM, (2021)