default search action
Tobias Scheidat
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c35]Tobias Scheidat, Grit Marschik, Stephanie Böhnke, Korinna Bade, Lisa Pippirs:
Das Interesse von Mädchen an MINT stärken mithilfe der intoMINT-App. DELFI 2021: 363-364 - [c34]Korinna Bade, Stephanie Böhnke, Grit Marschik, Tobias Scheidat:
Die intoMINT App als Einstieg in die Informatik. GI-Jahrestagung 2021: 1665-1668 - [i1]Norman Poh, Thirimachos Bourlai, Josef Kittler, Lorène Allano, Fernando Alonso-Fernandez, Onkar Ambekar, John P. Baker, Bernadette Dorizzi, Omolara Fatukasi, Julian Fiérrez, Harald Ganster, Javier Ortega-Garcia, Donald E. Maurer, Albert Ali Salah, Tobias Scheidat, Claus Vielhauer:
Benchmarking Quality-Dependent and Cost-Sensitive Score-Level Multimodal Biometric Fusion Algorithms. CoRR abs/2111.08703 (2021)
2010 – 2019
- 2019
- [c33]Tobias Scheidat, Sandra Scholz, Mailyn Engel, Stephanie Böhnke, Heike Mrech, Korinna Bade:
Die intoMINT-App: Spielerisch für MINT begeistern und Berufsbilder vermitteln. DeLFI 2019: 285-286 - 2017
- [j5]Tobias Scheidat, Michael Kalbitz, Claus Vielhauer:
Biometric authentication based on 2D/3D sensing of forensic handwriting traces. IET Biom. 6(4): 316-324 (2017) - [c32]Michael Kalbitz, Tobias Scheidat, Benjamin Yüksel, Claus Vielhauer:
Towards Automated Forensic Pen Ink Verification by Spectral Analysis. IWDW 2017: 18-30 - 2016
- [c31]Michael Kalbitz, Tobias Scheidat, Claus Vielhauer:
Investigation of adaptive local threshold segmentation in context of 3D-handwriting forensics. IPTA 2016: 1-6 - [c30]Michael Kalbitz, Tobias Scheidat, Claus Vielhauer:
First investigation of feasibility of contact-less non-destructive optical sensors to detect, acquire and digitally process forensic handwriting based on pressure information. IWBF 2016: 1-6 - [c29]Tobias Scheidat, Michael Kalbitz, Claus Vielhauer:
Towards biometrie features for 2D/3D sensoring of forensic handwriting. SPLINE 2016: 1-5 - 2015
- [b1]Tobias Scheidat:
Optimierung biometrischer Hash-Algorithmen für die dynamische Handschrift. Otto von Guericke University Magdeburg, 2015 - [c28]Andrey Makrushin, Kun Qian, Claus Vielhauer, Tobias Scheidat:
Forensic analysis: on the capability of optical sensors to visualize latent fingerprints on rubber gloves. IWBF 2015: 1-6 - [c27]Andrey Makrushin, Tobias Scheidat, Claus Vielhauer:
Capturing latent fingerprints from metallic painted surfaces using UV-VIS spectroscope. Media Watermarking, Security, and Forensics 2015: 94090B - 2013
- [c26]Andreas Hasselberg, René Zimmermann, Christian Kraetzer, Tobias Scheidat, Claus Vielhauer, Karl Kümmel:
Security of Features Describing the Visual Appearance of Handwriting Samples Using the Bio-hash Algorithm of Vielhauer against an Evolutionary Algorithm Attack. Communications and Multimedia Security 2013: 85-94 - 2012
- [j4]Andrey Makrushin, Tobias Scheidat, Claus Vielhauer:
Improving Reliability of Biometric Hash Generation through the Selection of Dynamic Handwriting Features. Trans. Data Hiding Multim. Secur. 8: 19-41 (2012) - [c25]Karl Kümmel, Tobias Scheidat, Claus Vielhauer, Jana Dittmann:
Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries. Communications and Multimedia Security 2012: 16-25 - [c24]Tobias Scheidat, Karl Kümmel, Claus Vielhauer:
Short Term Template Aging Effects on Biometric Dynamic Handwriting Authentication Performance. Communications and Multimedia Security 2012: 107-116 - [c23]Robert Fischer, Tobias Kiertscher, Stefan Gruhn, Tobias Scheidat, Claus Vielhauer:
From Biometrics to Forensics: A Feature Collection and First Feature Fusion Approaches for Latent Fingerprint Detection Using a Chromatic White Light (CWL) Sensor. Communications and Multimedia Security 2012: 207-210 - 2011
- [c22]Andrey Makrushin, Tobias Scheidat, Claus Vielhauer:
Handwriting Biometrics: Feature Selection Based Improvements in Authentication and Hash Generation Accuracy. BIOID 2011: 37-48 - [c21]Karl Kümmel, Tobias Scheidat, Christian Arndt, Claus Vielhauer:
Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting. Communications and Multimedia Security 2011: 85-93 - [c20]Tobias Scheidat, Juliane Heinze, Claus Vielhauer, Jana Dittmann, Christian Kraetzer:
Comparative review of studies on aging effects in context of biometric authentication. Multimedia on Mobile Devices / Multimedia Content Access: Algorithms and Systems 2011: 788110 - [c19]Nesma Houmani, Sonia Garcia-Salicetti, Bernadette Dorizzi, Jugurta Montalvão, Jânio Coutinho Canuto, Marcus V. A. Andrade, Yu Qiao, Xingxing Wang, Tobias Scheidat, Andrey Makrushin, Daigo Muramatsu, Joanna Putz-Leszczynska, Michal Kudelski, Marcos Faúndez-Zanuy, Juan Manuel Pascual-Gaspar, Valentín Cardeñoso-Payo, Carlos Vivaracho-Pascual, Enrique Argones-Rúa, José Luis Alba-Castro, Alisher Kholmatov, Berrin A. Yanikoglu:
BioSecure Signature Evaluation Campaign (ESRA'2011): evaluating systems on quality-based categories of skilled forgeries. IJCB 2011: 1-10 - [c18]Andrey Makrushin, Tobias Scheidat, Claus Vielhauer:
Towards robust biohash generation for dynamic handwriting using feature selection. DSP 2011: 1-6 - [c17]Tobias Scheidat, Claus Vielhauer, Robert Fischer:
Comparative study on fusion strategies for biometric handwriting. MM&Sec 2011: 61-68 - 2010
- [c16]Karl Kümmel, Claus Vielhauer, Tobias Scheidat, Dirk Franke, Jana Dittmann:
Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction. Communications and Multimedia Security 2010: 178-190
2000 – 2009
- 2009
- [j3]Tobias Scheidat, Claus Vielhauer, Jana Dittmann:
Handwriting verification - Comparison of a multi-algorithmic and a multi-semantic approach. Image Vis. Comput. 27(3): 269-278 (2009) - [j2]Norman Poh, Thirimachos Bourlai, Josef Kittler, Lorène Allano, Fernando Alonso-Fernandez, Onkar Ambekar, John P. Baker, Bernadette Dorizzi, Omolara Fatukasi, Julian Fiérrez-Aguilar, Harald Ganster, Javier Ortega-Garcia, Donald E. Maurer, Albert Ali Salah, Tobias Scheidat, Claus Vielhauer:
Benchmarking quality-dependent and cost-sensitive score-level multimodal biometric fusion algorithms. IEEE Trans. Inf. Forensics Secur. 4(4): 849-866 (2009) - [c15]Tobias Scheidat, Michael Biermann, Jana Dittmann, Claus Vielhauer, Karl Kümmel:
Multi-biometric Fusion for Driver Authentication on the Example of Speech and Face. COST 2101/2102 Conference 2009: 220-227 - [c14]Tobias Scheidat, Marcus Leich, Mark Alexander, Claus Vielhauer:
Support Vector Machines for Dynamic Biometric Handwriting Classification. AIAI Workshops 2009: 118-125 - 2008
- [c13]Tobias Scheidat, Claus Vielhauer, Jana Dittmann:
Advanced Studies on Reproducibility of Biometric Hashes. BIOID 2008: 150-159 - [c12]Tobias Scheidat, Claus Vielhauer:
Biometric hashing for handwriting: entropy-based feature selection and semantic fusion. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 68190N - [c11]Christian Zeitz, Tobias Scheidat, Jana Dittmann, Claus Vielhauer, Elisardo González-Agulla, Enrique Otero Muras, Carmen García-Mateo, José Luis Alba-Castro:
Security issues of Internet-based biometric authentication systems: risks of Man-in-the-Middle and BioPhishing on the example of BioWebAuth. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 68190R - 2007
- [j1]Sonia Garcia-Salicetti, Julian Fiérrez-Aguilar, Fernando Alonso-Fernandez, Claus Vielhauer, Richard M. Guest, Lorène Allano, Doan Trung Tung, Tobias Scheidat, Van-Bao Ly, Jana Dittmann, Bernadette Dorizzi, Javier Ortega-Garcia, Joaquin Gonzalez-Rodriguez, Martino Bacile Di Castiglione, Michael C. Fairhurst:
Biosecure reference systems for on-line signature verification: A study of complementarity. Ann. des Télécommunications 62(1-2): 36-61 (2007) - [c10]Tobias Scheidat, Claus Vielhauer, Jana Dittmann:
Study of possibility of on-pen matching for biometric handwriting verification. EUSIPCO 2007: 184-188 - [c9]Tobias Scheidat, Claus Vielhauer, Jana Dittmann:
Single-Semantic Multi-Instance Fusion of Handwriting Based Biometric Authentication Systems. ICIP (2) 2007: 393-396 - [c8]Tobias Scheidat, Claus Vielhauer:
Analyzing a multimodal biometric system using real and virtual users. Security, Steganography, and Watermarking of Multimedia Contents 2007: 650512 - 2006
- [c7]Tobias Scheidat, Andreas Engel, Claus Vielhauer:
Parameter optimization for biometric fingerprint recognition using genetic algorithms. MM&Sec 2006: 130-134 - [c6]Andrea Oermann, Tobias Scheidat, Claus Vielhauer, Jana Dittmann:
Semantic Fusion for Biometric User Authentication as Multimodal Signal Processing. MRCS 2006: 546-553 - [c5]Franziska Wolf, Tobias Scheidat, Claus Vielhauer:
Study of Applicability of Virtual Users in Evaluating Multimodal Biometrics. MRCS 2006: 554-561 - [c4]Tobias Scheidat, Franziska Wolf, Claus Vielhauer:
Analyse biometrischer Handschriftverifikation im Kontext von Metadaten. Sicherheit 2006: 54-65 - [c3]Tobias Scheidat, Franziska Wolf, Claus Vielhauer:
Analyzing handwriting biometrics in metadata context. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60720H - 2005
- [c2]Claus Vielhauer, Tobias Scheidat:
Multimodal Biometrics for Voice and Handwriting. Communications and Multimedia Security 2005: 191-199 - [c1]Tobias Scheidat, Claus Vielhauer, Jana Dittmann:
Distance-Level Fusion Strategies for Online Signature Verification. ICME 2005: 1294-1297
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint