default search action
14. MM&Sec 2012: Coventry, UK
- Chang-Tsun Li, Jana Dittmann, Stefan Katzenbeisser, Scott Craver:
Multimedia and Security Workshop, MM&Sec 2012, Coventry, United Kingdom, September 6-7, 2012. ACM 2012, ISBN 978-1-4503-1417-6
Data hiding
- Andrew David Ker, Tomás Pevný:
Batch steganography in the real world. 1-10 - Ivans Lubenko, Andrew D. Ker:
Steganalysis with mismatched covers: do simple classifiers help? 11-18 - Séverine Baudry:
Frame-accurate temporal registration for non-blind video watermarking. 19-26 - Waldemar Berchtold, Marcel Schäfer:
Performance and code length optimization of joint decoding tardos fingerprinting. 27-32
Pattern recognition and security for crime scene forensics traces: from latent fingerprints up material and technica
- M. Hamed Izadi, Andrzej Drygajlo:
Embedding cylinder quality measures into minutia cylinder-code based latent fingerprint matching. 33-38 - Ronny Merkel, Claus Vielhauer:
On using flat bed scanners for the age determination of latent fingerprints: first results for the binary pixel feature. 39-46 - Eric Clausing, Christian Kraetzer, Jana Dittmann, Claus Vielhauer:
A first approach for the contactless acquisition and automated detection of toolmarks on pins of locking cylinders using 3D confocal microscopy. 47-56 - Christian Arndt, Christian Kraetzer, Claus Vielhauer:
First approach for a computer-aided textile fiber type determination based on template matching using a 3D laser scanning microscope. 57-66 - Robert Fischer, Claus Vielhauer:
Forensic ballistic analysis using a 3D sensor device. 67-76
Security applications
- Zekeriya Erkin, Michael Beye, Thijs Veugen, Reginald L. Lagendijk:
Privacy-preserving content-based recommender system. 77-84 - Andreas Unterweger, Andreas Uhl:
Length-preserving bit-stream-based JPEG encryption. 85-90 - Yannis Panagakis, Constantine Kotropoulos:
Automatic telephone handset identification by sparse representation of random spectral features. 91-96
Forensic challenges
- Mauro Barni, Marco Fontani, Benedetta Tondi:
A universal technique to hide traces of histogram-based image manipulations. 97-104 - Sotiris Karavarsamis, Ioannis Pitas, Nikos Ntarmos:
Recognizing pornographic images. 105-108 - Thomas Gloe, Stefan Pfennig, Matthias Kirchner:
Unexpected artefacts in PRNU-based camera identification: a 'Dresden Image Database' case-study. 109-114
Biometrics & security
- Meryem Erbilek, Michael C. Fairhurst:
A methodological framework for investigating age factors on the performance of biometric systems. 115-122 - Nadia Al-Hassan, Sabah A. Jassim, Harin Sellahewa:
Enhancing face recognition at a distance using super resolution. 123-132 - Rainer Kärgel, Mario Hildebrandt, Jana Dittmann:
An evaluation of biometric fingerprint matchers in a forensic context using latent impressions. 133-138 - Yu Guan, Chang-Tsun Li, Yongjian Hu:
An adaptive system for gait recognition in multi-view environments. 139-144 - Athira M. Nambiar, Paulo Lobato Correia, Luís Ducla Soares:
Frontal gait recognition combining 2D and 3D data. 145-150 - Riccardo Satta, Giorgio Fumera, Fabio Roli:
Appearance-based people recognition by local dissimilarity representations. 151-156 - Luca Ghiani, Gian Luca Marcialis, Fabio Roli:
Experimental results on the feature-level fusion of multiple fingerprint liveness detection algorithms. 157-164 - Riccardo Lazzeretti, Jorge Guajardo, Mauro Barni:
Privacy preserving ECG quality evaluation. 165-174
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.