The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Christoph Busch: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michael Arnold, Henning Daum, Christoph Busch
    Comparative Study on Fingerprint Recognition Systems - Project BioFinger. [Citation Graph (0, 0)][DBLP]
    BIOSIG, 2003, pp:33-38 [Conf]
  2. René Salamon, Henning Daum, Christoph Busch, Andrew Pretzel
    Benchmarking of Face Recognition Systems - Project BioFace. [Citation Graph (0, 0)][DBLP]
    BIOSIG, 2003, pp:13-22 [Conf]
  3. Christoph Busch
    Inter-patient analysis of tomographic data. [Citation Graph (0, 0)][DBLP]
    CBMS, 1997, pp:173-178 [Conf]
  4. Christoph Busch, Martin Schmerer
    Ein Verfahren zur Texturanalyse basierend auf Multiplen Waveletbasen. [Citation Graph (0, 0)][DBLP]
    DAGM-Symposium, 1995, pp:562-569 [Conf]
  5. Michael Arnold, Christoph Busch, Martin Schmucker
    Szenario-basierte Testverfahren zur Zertifizierung von Wasserzeichen. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit"), 2003, pp:215-226 [Conf]
  6. Michael Voigt, Bian Yang, Christoph Busch
    High-capacity reversible watermarking for 2D vector data. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:409-417 [Conf]
  7. Bian Yang, Martin Schmucker, Wolfgang Funk, Christoph Busch, Sheng-He Sun
    Integer DCT-based reversible watermarking for images using companding technique. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:405-415 [Conf]
  8. Bian Yang, Martin Schmucker, Xiamu Niu, Christoph Busch, Sheng-He Sun
    Integer-DCT-based reversible image watermarking by adaptive coefficient modification. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:218-229 [Conf]
  9. Longjiang Yu, Martin Schmucker, Christoph Busch, Sheng-He Sun
    Cumulant-based image fingerprints. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:68-75 [Conf]
  10. Christoph Busch
    Wavelet based texture segmentation of multi-modal tomographic images. [Citation Graph (0, 0)][DBLP]
    Computers & Graphics, 1997, v:21, n:3, pp:347-358 [Journal]
  11. Oliver Benedens, Christoph Busch
    Towards Blind Detection of Robust Watermarks in Polygonal Models. [Citation Graph (0, 0)][DBLP]
    Comput. Graph. Forum, 2000, v:19, n:3, pp:- [Journal]
  12. Christoph Busch, Michael Eberle
    Morphological Operations for Color-Coded Images. [Citation Graph (0, 0)][DBLP]
    Comput. Graph. Forum, 1995, v:14, n:3, pp:193-204 [Journal]
  13. Christoph Busch, Eric Debes
    Wavelet Transform for Analyzing Fog Visibility. [Citation Graph (0, 0)][DBLP]
    IEEE Intelligent Systems, 1998, v:13, n:6, pp:66-71 [Journal]
  14. Xuebing Zhou, Tom A. M. Kevenaar, Emile Kelkboom, Christoph Busch, Michiel van der Veen, Alexander Nouak
    Privacy enhancing technology for a 3D-face recognition system. [Citation Graph (0, 0)][DBLP]
    BIOSIG, 2007, pp:3-14 [Conf]
  15. Michael Voigt, Bian Yang, Christoph Busch
    Reversible watermarking of 2D-vector data. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:160-165 [Conf]
  16. Bian Yang, Martin Schmucker, Christoph Busch, Xiamu Niu, Sheng-He Sun
    Approaching optimal value expansion for reversible watermarking. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2005, pp:95-102 [Conf]

  17. A Reference Architecture for Biometric Template Protection based on Pseudo Identities. [Citation Graph (, )][DBLP]


  18. A Novel Privacy Enhancing Algorithm for Biometric System. [Citation Graph (, )][DBLP]


  19. Improving Border Control with 3D Face Recognition. [Citation Graph (, )][DBLP]


  20. Semantic Conformance Testing Method for Finger Minutiae Data. [Citation Graph (, )][DBLP]


  21. Biometrie - Beschleuniger oder Bremser von Identitätsdiebstahl. [Citation Graph (, )][DBLP]


  22. Multi-Sample Fusion with Template Protection. [Citation Graph (, )][DBLP]


  23. 3D Face Recognition for Unattended Border Control. [Citation Graph (, )][DBLP]


  24. Rechtsradikales eCampaigning am Beispiel der Anti-Islam-Kampagne. [Citation Graph (, )][DBLP]


  25. Geometric-Aligned Cancelable Fingerprint Templates. [Citation Graph (, )][DBLP]


  26. A Security Analysis of Biometric Template Protection Schemes. [Citation Graph (, )][DBLP]


  27. Contrast Enhancement and Metrics for Biometric Vein Pattern Recognition. [Citation Graph (, )][DBLP]


  28. A Novel Template Protection Algorithm for Iris Recognition. [Citation Graph (, )][DBLP]


  29. Feature-Level Fusion of Iris and Face for Personal Identification. [Citation Graph (, )][DBLP]


  30. 3-D-Gesichtserkennung für die unbeaufsichtigte Grenzkontrolle. [Citation Graph (, )][DBLP]


  31. Multimodal Biometric Recognition Based on Complex KFDA. [Citation Graph (, )][DBLP]


  32. Empowerment of Health Professionals: How High Level Security Education Can Raise Awareness and Confidence. [Citation Graph (, )][DBLP]


  33. A 3D Face Recognition Algorithm Using Histogram-based Features. [Citation Graph (, )][DBLP]


  34. Robust minutiae hash for fingerprint template protection. [Citation Graph (, )][DBLP]


  35. Joint reversible data hiding and image encryption. [Citation Graph (, )][DBLP]


  36. Encrypting Fingerprint Minutiae Templates by Random Quantization. [Citation Graph (, )][DBLP]


  37. Guest Editors' Introduction: Image Security. [Citation Graph (, )][DBLP]


  38. Digital Watermarking: From Concepts to Real-Time Video Applications. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002