Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 34 matches
- 2010
- Hisham Al-Assam, Harin Sellahewa, Sabah Jassim:
Multi-factor biometrics for authentication: a false sense of security. MM&Sec 2010: 81-88 - Michael Arnold, Peter G. Baum, Xiao-Ming Chen:
Robust detection of audio watermarks after acoustic path transmission. MM&Sec 2010: 117-126 - Mauro Barni, Tiziano Bianchi, Dario Catalano, Mario Di Raimondo, Ruggero Donida Labati, Pierluigi Failla, Dario Fiore, Riccardo Lazzeretti, Vincenzo Piuri, Fabio Scotti, Alessandro Piva:
Privacy-preserving fingercode authentication. MM&Sec 2010: 231-240 - Lionel Beaugé, Andrzej Drygajlo:
Fully featured secure biometric smart card device for fingerprint-based authentication and identification. MM&Sec 2010: 181-186 - Deepayan Bhowmik, Charith Abhayaratne:
Video watermarking using motion compensated 2D+t+2D filtering. MM&Sec 2010: 127-136 - Julien Bringer, Hervé Chabanne:
Negative databases for biometric data. MM&Sec 2010: 55-62 - Gang Cao, Yao Zhao, Rongrong Ni, Huawei Tian:
Anti-forensics of contrast enhancement in digital images. MM&Sec 2010: 25-34 - Jung-Ho Choi, Heung-Kyu Lee, Hae-Yeoun Lee, Young-Ho Suh:
Color laser printer forensics with noise texture analysis. MM&Sec 2010: 19-24 - Pierluigi Failla, Yagiz Sutcu, Mauro Barni:
eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics. MM&Sec 2010: 241-246 - Xiaoying Feng, Gwenaël J. Doërr:
FLD-based detection of re-compressed speech signals. MM&Sec 2010: 43-48 - Tomás Filler, Jessica J. Fridrich:
Steganography using Gibbs random fields. MM&Sec 2010: 199-212 - Marco Fontani, Alessia De Rosa, Roberto Caldelli, Francesco Filippini, Alessandro Piva, Matteo Consalvo, Vito Cappellini:
Reversible watermarking for image integrity verification in hierarchical PACS. MM&Sec 2010: 161-168 - Xifeng Gao, Caiming Zhang, Yu Wei, Weitao Li:
A highly adaptable capacity and invisibility 3D watermarking based on four-points sets. MM&Sec 2010: 137-146 - Modris Greitans, Mihails Pudzs, Rihards Fuksis:
Palm vein biometrics based on infrared imaging and complex matched filtering. MM&Sec 2010: 101-106 - Ari Juels:
Biometrics in electronic travel documents. MM&Sec 2010: 1-2 - Andrew D. Ker:
The square root law does not require a linear key. MM&Sec 2010: 213-224 - Matthias Kirchner:
Linear row and column predictors for the analysis of resized images. MM&Sec 2010: 13-18 - Jan Kodovský, Jessica J. Fridrich:
Quantitative steganalysis of LSB embedding in JPEG domain. MM&Sec 2010: 187-198 - Christian Kraetzer, Ronny Merkel, Robert Altschaffel, Eric Clausing, Maik Schott, Jana Dittmann:
Modelling watermark communication protocols using the CASPER modelling language. MM&Sec 2010: 107-116 - Karl Kümmel, Claus Vielhauer:
Reverse-engineer methods on a biometric hash algorithm for dynamic handwriting. MM&Sec 2010: 67-72 - Ji Won Lee, Min-Jeong Lee, Tae-Woo Oh, Seung-Jin Ryu, Heung-Kyu Lee:
Screenshot identification using combing artifact from interlaced video. MM&Sec 2010: 49-54 - Chris P. Levett, Arshad Jhumka, Sarabjot Singh Anand:
Towards event ordering in digital forensics. MM&Sec 2010: 35-42 - Siwei Lyu:
Estimating vignetting function from a single image for image authentication. MM&Sec 2010: 3-12 - Andrey Makrushin, Claus Vielhauer, Jana Dittmann:
The impact of ARTMAP to appearance-based face verification. MM&Sec 2010: 89-94 - Peter Meerwald, Andreas Uhl:
Watermark detection on quantized transform coefficients using product bernoulli distributions. MM&Sec 2010: 175-180 - Michele Muzzarelli, Marco Carli, Giulia Boato, Karen O. Egiazarian:
Reversible watermarking via histogram shifting and least square optimization. MM&Sec 2010: 147-152 - Marcel Schäfer, Waldemar Berchtold, Sascha Zmudzinski, Martin Steinebach:
Zero false positive 2-secure fingerprinting watermarking based on combining hamming distance conditions and parent pair search. MM&Sec 2010: 169-174 - Valentin Schwamberger, Matthias O. Franz:
Simple algorithmic modifications for improving blind steganalysis performance. MM&Sec 2010: 225-230 - Thomas Stütz, Vinod Pankajakshan, Florent Autrusseau, Andreas Uhl, Heinz Hofbauer:
Subjective and objective quality assessment of transparently encrypted JPEG2000 images. MM&Sec 2010: 247-252 - Carmelo Velardo, Jean-Luc Dugelay:
Face recognition with DAISY descriptors. MM&Sec 2010: 95-100
skipping 4 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-25 05:42 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint