Maik Schott
According to our database1,
Maik Schott
authored at least 16 papers
between 2006 and 2015.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2015
Proceedings of the Datenbanksysteme für Business, Technologie und Web (BTW 2015), 2015
2014
Context-based approach of separating contactless captured high-resolution overlapped latent fingerprints.
IET Biom., 2014
2013
Separation of contactless captured high-resolution overlapped latent fingerprints: Parameter optimisation and evaluation.
Proceedings of the 1st International Workshop on Biometrics and Forensics, 2013
2012
Sequence detection of overlapping latent fingerprints using a short-term aging feature.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
2011
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011
Proceedings of the Media Forensics and Security III, 2011
Fingerprint Forensics Application Protocol: Semi-automated Modeling and Verification of Watermark-Based Communication Using CASPER and FDR.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011
Proceedings of the 1st International Workshop on Semantic Digital Archives, 2011
2010
Proceedings of the Multimedia and Security Workshop, 2010
2009
Unweighted fusion in microphone forensics using a decision tree and linear logistic regression models.
Proceedings of the Multimedia and Security Workshop, 2009
Proceedings of the Advances in Data Mining. Applications and Theoretical Aspects, 2009
Car-seat occupancy detection using a monocular 360° NIR camera and advanced template matching.
Proceedings of the 16th International Conference on Digital Signal Processing, 2009
2008
Proceedings of the Security, 2008
2007
Nested object watermarking: from the rectangular con-straint to polygonal and private annotations.
Proceedings of the 9th workshop on Multimedia & Security, 2007
2006
Proceedings of the 8th workshop on Multimedia & Security, 2006