Author of the publication

Blind authentication: a secure crypto-biometric verification protocol.

, , , and . IEEE Trans. Inf. Forensics Secur., 5 (2): 255-268 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IDD: A Dataset for Exploring Problems of Autonomous Navigation in Unconstrained Environments., , , , and . CoRR, (2018)A Sketch-Based Approach To Video Retrieval Using Qualitative Features., and . ICVGIP, page 54:1-54:8. ACM, (2014)IDD: A Dataset for Exploring Problems of Autonomous Navigation in Unconstrained Environments., , , , and . WACV, page 1743-1751. IEEE, (2019)Pose Invariant Palmprint Recognition., and . ICB, volume 5558 of Lecture Notes in Computer Science, page 577-586. Springer, (2009)Leveraging multiple tasks to regularize fine-grained classification., and . ICPR, page 3476-3481. IEEE, (2016)Universal Material Translator: Towards Spoof Fingerprint Generalization., , , , and . ICB, page 1-8. IEEE, (2019)Fine pose estimation of known objects in cluttered scene images., , and . ACPR, page 630-634. IEEE, (2015)Blind authentication: a secure crypto-biometric verification protocol., , , and . IEEE Trans. Inf. Forensics Secur., 5 (2): 255-268 (2010)One-Shot Sensor and Material Translator : A Bilinear Decomposer for Fingerprint Presentation Attack Generalization., and . IJCB, page 1-10. IEEE, (2022)STQ-Nets: Unifying Network Binarization and Structured Pruning., , and . BMVC, BMVA Press, (2020)