Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine learning attack on copy detection patterns: are 1x1 patterns cloneable?, , , , , and . CoRR, (2021)A Machine Learning-Based Digital Twin for Anti-Counterfeiting Applications With Copy Detection Patterns., , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Authentication Of Copy Detection Patterns Under Machine Learning Attacks: A Supervised Approach., , , , , , and . ICIP, page 1296-1300. IEEE, (2022)Digital twins of physical printing-imaging channel., , , , , , and . WIFS, page 1-6. IEEE, (2022)Mobile authentication of copy detection patterns., , , , , and . EURASIP J. Inf. Secur., 2023 (1): 4 (December 2023)Printing variability of copy detection patterns., , , , , , and . WIFS, page 1-6. IEEE, (2022)Mobile authentication of copy detection patterns: how critical is to know fakes?, , , , , and . WIFS, page 1-6. IEEE, (2021)Anomaly localization for copy detection patterns through print estimations., , , , , , and . WIFS, page 1-6. IEEE, (2022)Mobile authentication of copy detection patterns., , , , , and . CoRR, (2022)Mathematical model of printing-imaging channel for blind detection of fake copy detection patterns., , , , , , and . WIFS, page 1-6. IEEE, (2022)