This book provides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation ...
Continue readingProvides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation such as DeepFakes, ...
Continue readingHandbook of Multibiometrics, a professional book, introduces multibiometric systems, and demonstrates the noteworthy advantages ...
Continue readingThis handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric ...
Continue readingHuman Ear Recognition by Computer is the first book on the automatic recognition of human ears. It presents an entire range ...
Continue readingThis book presents the most interesting talks given at ISSE 2006 - the forum for the interdisciplinary discussion of how ...
Continue readingThis book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion ...
Continue readingThis volume contains the Proceedings of the 13th International Conference on Image Analysis and Processing (ICIAP 2005), ...
Continue readingThese papers cover image restoration and enhancement, image and video processing and analysis, image segmentation, computer ...
Continue readingThis two-volume set LNCS 12131 and LNCS 12132 constitutes the refereed proceedings of the 17th International Conference on ...
Continue readingThis two-volume set LNCS 12131 and LNCS 12132 constitutes the refereed proceedings of the 17th International Conference on ...
Continue readingICIAR 2005, the International Conference on Image Analysis and Recognition, was the second ICIAR conference, and was held ...
Continue readingICIAR 2006, the International Conference on Image Analysis and Recognition, was the third ICIAR conference, and was held ...
Continue readingICIAR 2006, the International Conference on Image Analysis and Recognition, was the third ICIAR conference, and was held ...
Continue readingThe 110 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 226 submissions. ...
Continue readingThis book constitutes the refereed proceedings of the Third International Conference on Image and Signal Processing, ICISP ...
Continue readingComplete with Springer's trademark online files and updates, this fascinating text constitutes the refereed proceedings ...
Continue readingThe 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information ...
Continue readingThis book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security ...
Continue readingThis book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ...
Continue reading