Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Matching Faces with Alterations due to Plastic Surgery and Disguise., , , and . BTAS, page 1-7. IEEE, (2018)Learning A Shared Transform Model for Skull to Digital Face Image Matching., , , , and . BTAS, page 1-7. IEEE, (2018)Improving verification accuracy by synthesis of locally enhanced biometric images and deformable model, , and . Signal Processing, 87 (11): 2746--2764 (November 2007)Self-similarity representation of Weber faces for kinship classification., , and . BTAS, page 245-250. IEEE, (2012)Detecting medley of iris spoofing attacks using DESIST., , , , and . BTAS, page 1-6. IEEE, (2016)Automated clarity and quality assessment for latent fingerprints., , and . BTAS, page 1-6. IEEE, (2013)Age Transformation for Improving Face Recognition Performance., , , and . PReMI, volume 4815 of Lecture Notes in Computer Science, page 576-583. Springer, (2007)Incremental subclass discriminant analysis: A case study in face recognition., , , and . ICIP, page 593-596. IEEE, (2012)Leap signature recognition using HOOF and HOT features., , and . ICIP, page 5012-5016. IEEE, (2014)CrowdFaceDB: Database and benchmarking for face verification in crowd., , , , and . Pattern Recognit. Lett., (2018)