


default search action
14. MM&Sec 2012: Coventry, UK
- Chang-Tsun Li, Jana Dittmann, Stefan Katzenbeisser, Scott Craver:

Multimedia and Security Workshop, MM&Sec 2012, Coventry, United Kingdom, September 6-7, 2012. ACM 2012, ISBN 978-1-4503-1417-6
Data hiding
- Andrew David Ker, Tomás Pevný

:
Batch steganography in the real world. 1-10 - Ivans Lubenko, Andrew D. Ker:

Steganalysis with mismatched covers: do simple classifiers help? 11-18 - Séverine Baudry:

Frame-accurate temporal registration for non-blind video watermarking. 19-26 - Waldemar Berchtold, Marcel Schäfer:

Performance and code length optimization of joint decoding tardos fingerprinting. 27-32
Pattern recognition and security for crime scene forensics traces: from latent fingerprints up material and technica
- M. Hamed Izadi, Andrzej Drygajlo:

Embedding cylinder quality measures into minutia cylinder-code based latent fingerprint matching. 33-38 - Ronny Merkel, Claus Vielhauer:

On using flat bed scanners for the age determination of latent fingerprints: first results for the binary pixel feature. 39-46 - Eric Clausing, Christian Kraetzer, Jana Dittmann, Claus Vielhauer:

A first approach for the contactless acquisition and automated detection of toolmarks on pins of locking cylinders using 3D confocal microscopy. 47-56 - Christian Arndt, Christian Kraetzer, Claus Vielhauer:

First approach for a computer-aided textile fiber type determination based on template matching using a 3D laser scanning microscope. 57-66 - Robert Fischer, Claus Vielhauer:

Forensic ballistic analysis using a 3D sensor device. 67-76
Security applications
- Zekeriya Erkin, Michael Beye, Thijs Veugen, Reginald L. Lagendijk:

Privacy-preserving content-based recommender system. 77-84 - Andreas Unterweger, Andreas Uhl:

Length-preserving bit-stream-based JPEG encryption. 85-90 - Yannis Panagakis

, Constantine Kotropoulos
:
Automatic telephone handset identification by sparse representation of random spectral features. 91-96
Forensic challenges
- Mauro Barni, Marco Fontani, Benedetta Tondi:

A universal technique to hide traces of histogram-based image manipulations. 97-104 - Sotiris Karavarsamis, Ioannis Pitas, Nikos Ntarmos

:
Recognizing pornographic images. 105-108 - Thomas Gloe, Stefan Pfennig, Matthias Kirchner:

Unexpected artefacts in PRNU-based camera identification: a 'Dresden Image Database' case-study. 109-114
Biometrics & security
- Meryem Erbilek

, Michael C. Fairhurst:
A methodological framework for investigating age factors on the performance of biometric systems. 115-122 - Nadia Al-Hassan, Sabah A. Jassim, Harin Sellahewa:

Enhancing face recognition at a distance using super resolution. 123-132 - Rainer Kärgel

, Mario Hildebrandt, Jana Dittmann:
An evaluation of biometric fingerprint matchers in a forensic context using latent impressions. 133-138 - Yu Guan, Chang-Tsun Li

, Yongjian Hu:
An adaptive system for gait recognition in multi-view environments. 139-144 - Athira M. Nambiar

, Paulo Lobato Correia
, Luís Ducla Soares:
Frontal gait recognition combining 2D and 3D data. 145-150 - Riccardo Satta, Giorgio Fumera

, Fabio Roli
:
Appearance-based people recognition by local dissimilarity representations. 151-156 - Luca Ghiani, Gian Luca Marcialis, Fabio Roli:

Experimental results on the feature-level fusion of multiple fingerprint liveness detection algorithms. 157-164 - Riccardo Lazzeretti

, Jorge Guajardo, Mauro Barni:
Privacy preserving ECG quality evaluation. 165-174

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














