Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wavelet based texture segmentation of multi-modal tomographic images.. Comput. Graph., 21 (3): 347-358 (1997)Privacy-preserving PLDA speaker verification using outsourced secure computation., , , , and . Speech Commun., (2019)An overview of touchless 2D fingerprint recognition., , , , and . EURASIP J. Image Video Process., 2021 (1): 8 (2021)TetraLoss: Improving the Robustness of Face Recognition against Morphing Attacks., , , and . CoRR, (2024)Attacking Face Recognition with T-shirts: Database, Vulnerability Assessment and Detection., , , , , , , and . CoRR, (2022)An Attack on Feature Level-based Facial Soft-biometric Privacy Enhancement., , , , , and . CoRR, (2021)Impact of Facial Tattoos and Paintings on Face Recognition Systems., , , , and . CoRR, (2021)Fingerprint Presentation Attack Detection Based on Local Features Encoding for Unknown Attacks., , , , and . CoRR, (2019)Single Morphing Attack Detection using Siamese Network and Few-shot Learning., , and . CoRR, (2022)Biometric Presentation Attack Detection: Beyond the Visible Spectrum., , , and . CoRR, (2019)