Abstract is missing.
- Gestalt Aspects of Security PatternsMario Köppen. 1-12 [doi]
- Physical Security Technologies at HitachiMinoru Sakairi. 13-30 [doi]
- Exploiting Character Class Information in Forensic Writer IdentificationFernando Alonso-Fernandez, Julian Fiérrez, Javier Galbally, Javier Ortega-Garcia. 31-42 [doi]
- Toward Forensics by Stroke Order Variation - Performance Evaluation of Stroke Correspondence MethodsWenjie Cai, Seiichi Uchida, Hiroaki Sakoe. 43-55 [doi]
- A Novel Seal Imprint Verification Method Based on Analysis of Difference Images and Symbolic RepresentationXiaoyang Wang, Youbin Chen. 56-67 [doi]
- Extraction of 3D Shape of a Tooth from Dental CT Images with Region Growing MethodRyuichi Yanagisawa, Shinichiro Omachi. 68-77 [doi]
- Cancellable Face Biometrics System by Combining Independent Component Analysis CoefficientsMinYi Jeong, Andrew Beng Jin Teoh. 78-87 [doi]
- Footwear Print Retrieval System for Real Crime Scene MarksYi Tang, Sargur N. Srihari, Harish Kasiviswanathan, Jason J. Corso. 88-100 [doi]
- Improvement of Inkjet Printer Spur Gear Teeth Number Estimation by Fixing the Order in Maximum Entropy Spectral AnalysisYoshinori Akao, Atsushi Yamamoto, Yoshiyasu Higashikawa. 101-113 [doi]
- Detecting Indentations on Documents Pressed by Pen Tip Force Using a Near Infrared Light Emitting Diode (NIR LED) and Shape from ShadingTakeshi Furukawa. 114-125 [doi]
- Similar Partial Copy Detection of Line Drawings Using a Cascade Classifier and Feature MatchingWeihan Sun, Koichi Kise. 126-137 [doi]
- Detection of Malicious Applications on Android OSFrancesco Di Cerbo, Andrea Girardello, Florian Michahelles, Svetlana Voronkova. 138-149 [doi]
- JPEG Quantization Tables Forensics: A Statistical ApproachBabak Mahdian, Stanislav Saic, Radim Nedbal. 150-159 [doi]
- Discovering Correspondences between Fingerprints Based on the Temporal Dynamics of Eye Movements from ExpertsChen Yu, Thomas A. Busey, John Vanderkolk. 160-172 [doi]
- Latent Fingerprint Rarity Analysis in Madrid Bombing CaseChang Su, Sargur N. Srihari. 173-184 [doi]
- Fingerprint Directional Image EnhancementLukasz Wieclaw. 185-192 [doi]
- What Kind of Strategies Does a Document Examiner Take in Handwriting Identification?Yoko Seki. 193-199 [doi]
- 3LSPG: Forensic Tool Evaluation by Three Layer Stochastic Process-Based Generation of DataYork Yannikos, Frederik Franke, Christian Winter, Markus Schneider. 200-211 [doi]