Author of the publication

Electronic Marking and Identification Techniques to Discourage Document Copying.

, , , and . IEEE J. Sel. Areas Commun., 13 (8): 1495-1504 (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Call Center Customer Verification by Query-Directed Passwords., , and . Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, page 54-67. Springer, (2004)Efficient Multi-Band Temporal Video Filter for Reducing Human-Robot Interaction.. CoRR, (2024)Using Information Extraction for Quality Analysis in Human Authentication., , , and . HICSS, IEEE Computer Society, (2005)Basic Techniques and Symbol-Level Recognition - An Overview.. GREC, volume 1072 of Lecture Notes in Computer Science, page 1-12. Springer, (1995)Comparing passwords, tokens, and biometrics for user authentication.. Proc. IEEE, 91 (12): 2021-2040 (2003)How to Speak an Authentication Secret Securely from an Eavesdropper., , and . Security Protocols Workshop, volume 5087 of Lecture Notes in Computer Science, page 215-229. Springer, (2006)Video Analytics Gait Trend Measurement for Fall Prevention and Health Monitoring., , , and . ICPR, page 489-496. IEEE, (2020)Electronic Marketing and Identification Techniques to Discourage Document Copying., , , and . INFOCOM, page 1278-1287. IEEE Computer Society, (1994)Experimental comparisons of binarization and multi-thresholding methods on document images.. ICPR (2), page 395-398. IEEE, (1994)Document Analysis versus Understanding: das'96 Working Group Report., and . DAS, volume 29 of Series in Machine Perception and Artificial Intelligence, page 512-514. WorldScientific, (1996)