Author of the publication

Information embedding and extraction for electrophotographic printing processes.

, , , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 607210. SPIE, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DNA2FACE: An approach to correlating 3D facial structure and DNA., , , , , and . IJCB, page 590-598. IEEE, (2017)3D face analysis for demographic biometrics., , and . ICB, page 201-207. IEEE, (2015)Printer identification based on graylevel co-occurrence features for security and forensic applications.., , , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 430-440. SPIE, (2005)Texture based attacks on intrinsic signature based printer identification., , and . Media Forensics and Security, volume 7541 of SPIE Proceedings, page 75410T. SPIE, (2010)Forensic printer detection using intrinsic signatures., , and . Media Forensics and Security, volume 7880 of SPIE Proceedings, page 78800R. SPIE, (2011)Direct-Write Printed Current Sensor for Load Monitoring Applications., , , , , and . ISGT, page 1-6. IEEE, (2019)Extrinsic signatures embedding and detection for information hiding and secure printing in electrophotography., , , , , and . ACC, page 1-6. IEEE, (2006)Survey of Scanner and Printer Forensics at Purdue University., , , , and . IWCF, volume 5158 of Lecture Notes in Computer Science, page 22-34. Springer, (2008)Channel model and operational capacity analysis of printed text documents., , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 65051U. SPIE, (2007)Scanner identification using feature-based processing and analysis., , and . IEEE Trans. Inf. Forensics Secur., 4 (1): 123-139 (2009)