Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 70 matches
- 2007
- Gady Agam, Suneel Suresh:
Warping-Based Offline Signature Recognition. IEEE Trans. Inf. Forensics Secur. 2(3-1): 430-437 (2007) - Nigel M. Allinson, Jeevandra Sivarajah, Ian Gledhill, Michael Carling, L. J. Allinson:
Robust Wireless Transmission of Compressed Latent Fingerprint Images. IEEE Trans. Inf. Forensics Secur. 2(3-1): 331-340 (2007) - Fernando Alonso-Fernandez, Julian Fiérrez-Aguilar, Javier Ortega-Garcia, Joaquin Gonzalez-Rodriguez, Hartwig Fronthaler, Klaus Kollreider, Josef Bigün:
A Comparative Study of Fingerprint Image-Quality Estimation Methods. IEEE Trans. Inf. Forensics Secur. 2(4): 734-743 (2007) - Félix Balado, Neil J. Hurley, Elizabeth P. McCarthy, Guenole C. M. Silvestre:
Performance Analysis of Robust Audio Hashing. IEEE Trans. Inf. Forensics Secur. 2(2): 254-266 (2007) - Francesco Beritelli, Salvatore Serrano:
Biometric Identification Based on Frequency Analysis of Cardiac Sounds. IEEE Trans. Inf. Forensics Secur. 2(3-2): 596-604 (2007) - Bir Bhanu, Nalini K. Ratha, B. V. K. Vijaya Kumar, Rama Chellappa, Josef Bigün:
Guest Editorial: Special Issue on Human Detection and Recognition. IEEE Trans. Inf. Forensics Secur. 2(3-2): 489-490 (2007) - Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc-Talon:
Performance Analysis of Scalar DC-QIM for Zero-Bit Watermarking. IEEE Trans. Inf. Forensics Secur. 2(2): 283-289 (2007) - Chin-Chen Chang, Yi-Pei Hsieh, Chih-Yang Lin:
Lossless Data Embedding With High Embedding Capacity Based on Declustering for VQ-Compressed Codes. IEEE Trans. Inf. Forensics Secur. 2(3-1): 341-349 (2007) - Jianjun Chen, Zoltan Safar, John Aasted Sørensen:
Multimodal Wireless Networks: Communication and Surveillance on the Same Infrastructure. IEEE Trans. Inf. Forensics Secur. 2(3-1): 468-484 (2007) - Maha El Choubassi, Pierre Moulin:
Noniterative Algorithms for Sensitivity Analysis Attacks. IEEE Trans. Inf. Forensics Secur. 2(2): 113-126 (2007) - Jamie Cook, Vinod Chandran, Sridha Sridharan:
Multiscale Representation for 3-D Face Recognition. IEEE Trans. Inf. Forensics Secur. 2(3-2): 529-536 (2007) - Hazim Kemal Ekenel, Hua Gao, Rainer Stiefelhagen:
3-D Face Recognition Using Local Appearance-Based Models. IEEE Trans. Inf. Forensics Secur. 2(3-2): 630-636 (2007) - Franco Frattolillo:
Watermarking Protocol for Web Context. IEEE Trans. Inf. Forensics Secur. 2(3-1): 350-363 (2007) - Teddy Furon:
A Constructive and Unifying Framework for Zero-Bit Watermarking. IEEE Trans. Inf. Forensics Secur. 2(2): 149-163 (2007) - Davrondzhon Gafurov, Einar Snekkenes, Patrick Bours:
Spoof Attacks on Gait Authentication System. IEEE Trans. Inf. Forensics Secur. 2(3-2): 491-502 (2007) - Lutz Goldmann, Ullrich J. Mönich, Thomas Sikora:
Components and Their Topology for Robust Face Detection in the Presence of Partial Occlusions. IEEE Trans. Inf. Forensics Secur. 2(3-2): 559-569 (2007) - Daniel González-Jiménez, José Luis Alba-Castro:
Toward Pose-Invariant 2-D Face Recognition Through Point Distribution Models and Facial Symmetry. IEEE Trans. Inf. Forensics Secur. 2(3-1): 413-429 (2007) - Daniel González-Jiménez, José Luis Alba-Castro:
Shape-Driven Gabor Jets for Face Description and Authentication. IEEE Trans. Inf. Forensics Secur. 2(4): 769-780 (2007) - Georgios Goudelis, Stefanos Zafeiriou, Anastasios Tefas, Ioannis Pitas:
Class-Specific Kernel-Discriminant Analysis for Face Verification. IEEE Trans. Inf. Forensics Secur. 2(3-2): 570-587 (2007) - Shan He, Min Wu:
Collusion-Resistant Video Fingerprinting for Large User Group. IEEE Trans. Inf. Forensics Secur. 2(4): 697-709 (2007) - Pablo H. Hennings-Yeomans, B. V. K. Vijaya Kumar, Marios Savvides:
Palmprint Classification Using Multiple Advanced Correlation Filters and Palm-Specific Segmentation. IEEE Trans. Inf. Forensics Secur. 2(3-2): 613-622 (2007) - Sheng Huang, Jian Kang Wu:
Optical Watermarking for Printed Document Authentication. IEEE Trans. Inf. Forensics Secur. 2(2): 164-173 (2007) - Xingliang Huang, Bo Zhang:
Statistically Robust Detection of Multiplicative Spread-Spectrum Watermarks. IEEE Trans. Inf. Forensics Secur. 2(1): 1-13 (2007) - Dimosthenis Ioannidis, Dimitrios Tzovaras, Ioannis G. Damousis, Savvas Argyropoulos, Konstantinos Moustakas:
Gait Recognition Using Compact Feature Extraction Transforms and Depth Information. IEEE Trans. Inf. Forensics Secur. 2(3-2): 623-630 (2007) - Micah K. Johnson, Hany Farid:
Exposing Digital Forgeries in Complex Lighting Environments. IEEE Trans. Inf. Forensics Secur. 2(3-1): 450-461 (2007) - Andrew D. Ker:
Steganalysis of Embedding in Two Least-Significant Bits. IEEE Trans. Inf. Forensics Secur. 2(1): 46-54 (2007) - Andrew D. Ker:
Derivation of Error Distribution in Least Squares Steganalysis. IEEE Trans. Inf. Forensics Secur. 2(2): 140-148 (2007) - Serap Kirbiz, Aweke N. Lemma, Mehmet Utku Celik, Stefan Katzenbeisser:
Decode-Time Forensic Watermarking of AAC Bitstreams. IEEE Trans. Inf. Forensics Secur. 2(4): 683-696 (2007) - Klaus Kollreider, Hartwig Fronthaler, Maycel Isaac Faraj, Josef Bigün:
Real-Time Face Detection and Motion Analysis With Application in "Liveness" Assessment. IEEE Trans. Inf. Forensics Secur. 2(3-2): 548-558 (2007) - Irene Kotsia, Stefanos Zafeiriou, Ioannis Pitas:
A Novel Discriminant Non-Negative Matrix Factorization Algorithm With Applications to Facial Image Characterization Problems. IEEE Trans. Inf. Forensics Secur. 2(3-2): 588-595 (2007)
skipping 40 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-24 19:32 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint