Author of the publication

Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing.

, , , , and . IH&MMSec, page 21-32. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards robust biohash generation for dynamic handwriting using feature selection., , and . DSP, page 1-6. IEEE, (2011)The impact of ARTMAP to appearance-based face verification., , and . MM&Sec, page 89-94. ACM, (2010)Improving Reliability of Biometric Hash Generation through the Selection of Dynamic Handwriting Features., , and . Trans. Data Hiding Multim. Secur., (2012)Synthetische Daten in der Biometrie., and . Datenschutz und Datensicherheit, 47 (1): 22-26 (2023)Car-seat occupancy detection using a monocular 360° NIR camera and advanced template matching., , , , , and . DPS, page 1-6. IEEE, (2009)Dempster-Shafer Theory for Fusing Face Morphing Detectors., , , , , and . EUSIPCO, page 1-5. IEEE, (2019)On feasibility of GAN-based fingerprint morphing., , , and . MMSP, page 1-6. IEEE, (2021)Data-Driven Fingerprint Reconstruction from Minutiae Based on Real and Synthetic Training Data., , and . VISIGRAPP (4: VISAPP), page 229-237. SCITEPRESS, (2023)Generation of Privacy-friendly Datasets of Latent Fingerprint Images using Generative Adversarial Networks., , , , and . VISIGRAPP (4: VISAPP), page 345-352. SCITEPRESS, (2021)Exemplarische Mensch-Maschine-Interaktionsszenarien und deren Komfort-, Safety- und Security-Implikationen am Beispiel von Gesicht und Sprache., , , and . Sicherheit, volume P-128 of LNI, page 315-327. GI, (2008)