Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Morphological synthesis of ECG signals for person authentication., , , , and . EUSIPCO, page 738-742. IEEE, (2007)Audio watermarking for monitoring and copy protection., , , and . ACM Multimedia Workshops, page 119-122. ACM Press, (2000)Forensic Watermarking in Digital Rights Management., , , and . Security, Privacy, and Trust in Modern Data Management, Springer, (2007)Face Recognition with Renewable and Privacy Preserving Binary Templates., , , , and . AutoID, page 21-26. IEEE Computer Society, (2005)Secure Embedding of Spread Spectrum Watermarks using Look-up-Tables., , , and . ICASSP (2), page 153-156. IEEE, (2007)Privacy enhancing technology for a 3D-face recognition system., , , , , and . BIOSIG, volume P-108 of LNI, page 3-14. GI, (2007)"3D Face": Biometric Template Protection for 3D Face Recognition., , , , and . ICB, volume 4642 of Lecture Notes in Computer Science, page 566-573. Springer, (2007)Reversible image watermarking., , and . ICIP (2), page 731-734. IEEE, (2003)Reversible watermarking for images., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 374-385. SPIE, (2004)Controlled Sharing of Personal Content using Digital Rights Management., , , and . WOSIS, page 173-185. INSTICC Press, (2005)