Author of the publication

A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates.

, , , , , , , , , , and . BTAS, page 1-7. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image counter-forensics based on feature injection., , , , , and . Media Watermarking, Security, and Forensics, volume 9028 of SPIE Proceedings, page 902810. SPIE, (2014)Exploring image dependencies: a new challenge in image forensics., , , , and . Media Forensics and Security, volume 7541 of SPIE Proceedings, page 75410X. SPIE, (2010)Detection of double AVC/HEVC encoding., and . EUSIPCO, page 2245-2249. IEEE, (2016)Object watermarking for for MPEG-4 video streams copyright protection., , , and . Security and Watermarking of Multimedia Contents, volume 3971 of SPIE Proceedings, page 465-476. SPIE, (2000)Shedding light on some possible remedies against watermark desynchronization: a case study.. Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 106-113. SPIE, (2005)Advantages and drawbacks of multiplicative spread spectrum watermarking., , and . Security and Watermarking of Multimedia Contents, volume 5020 of SPIE Proceedings, page 290-299. SPIE, (2003)Optimum decoding and detection of a multiplicative amplitude-encoded watermark., , , and . Security and Watermarking of Multimedia Contents, volume 4675 of SPIE Proceedings, page 409-420. SPIE, (2002)Processing encrypted signals: a new frontier for multimedia security.. MM&Sec, page 1. ACM, (2006)Wide Flat Minimum Watermarking for Robust Ownership Verification of GANs., , , and . CoRR, (2023)MPSteg-color: data hiding through redundant basis decomposition., and . IEEE Trans. Inf. Forensics Secur., 4 (3): 346-358 (2009)