default search action
Michiel van der Veen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2000 – 2009
- 2008
- [j5]Tom A. M. Kevenaar, Michiel van der Veen, Xuebing Zhou, Christoph Busch:
Privacy for biometric identification information. Datenschutz und Datensicherheit 32(6): 393-395 (2008) - [j4]Mehmet Utku Celik, Aweke N. Lemma, Stefan Katzenbeisser, Michiel van der Veen:
Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks. IEEE Trans. Inf. Forensics Secur. 3(3): 475-487 (2008) - [j3]Stefan Katzenbeisser, Aweke N. Lemma, Mehmet Utku Celik, Michiel van der Veen, Martijn Maas:
A Buyer-Seller Watermarking Protocol Based on Secure Embedding. IEEE Trans. Inf. Forensics Secur. 3(4): 783-786 (2008) - [c21]Nicolas Delvaux, Hervé Chabanne, Julien Bringer, Bruno Kindarji, Patrik Lindeberg, Johannes Midgren, Jeroen Breebaart, Ton H. Akkermans, Michiel van der Veen, Raymond N. J. Veldhuis, Els Kindt, Koen Simoens, Christoph Busch, Patrick Bours, Davrondzhon Gafurov, Bian Yang, Julien Stern, Carsten Rust, Bruno Cucinelli, Dimitrios Skepastianos:
Pseudo Identities Based on Fingerprint Characteristics. IIH-MSP 2008: 1063-1068 - 2007
- [c20]Xuebing Zhou, Tom A. M. Kevenaar, Emile Kelkboom, Christoph Busch, Michiel van der Veen, Alexander Nouak:
Privacy enhancing technology for a 3D-face recognition system. BIOSIG 2007: 3-14 - [c19]Gary Garcia Molina, Fons Bruekers, Cristian Presura, Marijn Damstra, Michiel van der Veen:
Morphological synthesis of ECG signals for person authentication. EUSIPCO 2007: 738-742 - [c18]Mehmet Utku Celik, Aweke N. Lemma, Stefan Katzenbeisser, Michiel van der Veen:
Secure Embedding of Spread Spectrum Watermarks using Look-up-Tables. ICASSP (2) 2007: 153-156 - [c17]Emile J. C. Kelkboom, Berk Gökberk, Tom A. M. Kevenaar, Anton H. M. Akkermans, Michiel van der Veen:
"3D Face": Biometric Template Protection for 3D Face Recognition. ICB 2007: 566-573 - [c16]Aweke N. Lemma, Michiel van der Veen:
Deterring watermark collusion attacks using signal processing techniques. Security, Steganography, and Watermarking of Multimedia Contents 2007: 65050M - [p1]Michiel van der Veen, Aweke N. Lemma, Mehmet Utku Celik, Stefan Katzenbeisser:
Forensic Watermarking in Digital Rights Management. Security, Privacy, and Trust in Modern Data Management 2007: 287-302 - 2006
- [j2]Claudine Conrado, Milan Petkovic, Michiel van der Veen, Wytse van der Velde:
Controlled Sharing of Personal Content Using Digital Rights Management. J. Res. Pract. Inf. Technol. 38(1) (2006) - [c15]Tom A. M. Kevenaar, Geert Jan Schrijen, Anton H. M. Akkermans, Marijn Damstra, Pim Tuyls, Michiel van der Veen:
Robust and Secure Biometrics: Some Application Examples. ISSE 2006: 196-203 - [c14]Aweke N. Lemma, Stefan Katzenbeisser, Mehmet Utku Celik, Michiel van der Veen:
Secure Watermark Embedding Through Partial Encryption. IWDW 2006: 433-445 - [c13]Tanya Ignatenko, Ton Kalker, Michiel van der Veen, Asker M. Bazen:
Reference point detection for improved fingerprint matching. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60720G - [c12]Michiel van der Veen, Tom A. M. Kevenaar, Geert Jan Schrijen, Ton H. Akkermans, Fei Zuo:
Face biometrics with renewable templates. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60720J - [c11]Aweke N. Lemma, Michiel van der Veen, Mehmet Utku Celik:
New modulation-based watermarking technique for video. Security, Steganography, and Watermarking of Multimedia Contents 2006: 607216 - 2005
- [j1]Michiel van der Veen, Aweke N. Lemma, Ton Kalker:
Electronic content delivery and forensic watermarking. Multim. Syst. 11(2): 174-184 (2005) - [c10]Fei Zuo, Peter H. N. de With, Michiel van der Veen:
Multistage Face Recognition Using Adaptive Feature Selection and Classification. ACIVS 2005: 17-25 - [c9]Tom A. M. Kevenaar, Geert Jan Schrijen, Michiel van der Veen, Anton H. M. Akkermans, Fei Zuo:
Face Recognition with Renewable and Privacy Preserving Binary Templates. AutoID 2005: 21-26 - [c8]Claudine Conrado, Milan Petkovic, Michiel van der Veen, Wytse van der Velde:
Controlled Sharing of Personal Content using Digital Rights Management. WOSIS 2005: 173-185 - 2004
- [c7]Sylvain Beauget, Michiel van der Veen, Aweke N. Lemma:
Informed detection of audio watermark for resolving playback speed modifications. MM&Sec 2004: 117-123 - [c6]Michiel van der Veen, Aweke N. Lemma, Ton Kalker:
Watermarking and fingerprinting for electronic music delivery. Security, Steganography, and Watermarking of Multimedia Contents 2004: 200-211 - [c5]Arno J. van Leest, Michiel van der Veen, Fons Bruekers:
Reversible watermarking for images. Security, Steganography, and Watermarking of Multimedia Contents 2004: 374-385 - 2003
- [c4]Arno J. van Leest, Michiel van der Veen, Fons Bruekers:
Reversible image watermarking. ICIP (2) 2003: 731-734 - [c3]Michiel van der Veen, Fons Bruekers, Arno J. van Leest, Stephane Cavin:
High capacity reversible watermarking for audio. Security and Watermarking of Multimedia Contents 2003: 1-11 - 2002
- [c2]Michiel van der Veen, Aweke Negash Lemma, Fons Bruekers, Javier Aprea, Ton Kalker:
Security issues in digital audio watermarking. EUSIPCO 2002: 1-4 - 2000
- [c1]Jaap Haitsma, Michiel van der Veen, Ton Kalker, Fons Bruekers:
Audio watermarking for monitoring and copy protection. ACM Multimedia Workshops 2000: 119-122
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint