Author of the publication

Biometrics beyond the Visible Spectrum: Imaging Technologies and Applications.

, , and . COST 2101/2102 Conference, volume 5707 of Lecture Notes in Computer Science, page 154-161. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Effects of Image Quality Degradation on Minutiae- and Ridge-Based Automatic Fingerprint Recognition., , , and . CoRR, (2022)Biometrics beyond the Visible Spectrum: Imaging Technologies and Applications., , and . COST 2101/2102 Conference, volume 5707 of Lecture Notes in Computer Science, page 154-161. Springer, (2009)Target Dependent Score Normalization Techniques and Their Application to Signature Verification., , and . ICBA, volume 3072 of Lecture Notes in Computer Science, page 498-504. Springer, (2004)Keystroke Biometrics for Student Authentication: A Case Study., and . ITiCSE, page 337. ACM, (2015)Complete Signal Modeling and Score Normalization for Function-Based Dynamic Signature Verification., , , and . AVBPA, volume 2688 of Lecture Notes in Computer Science, page 658-667. Springer, (2003)On the vulnerability of fingerprint verification systems to fake fingerprint attacks., , , , , and . CoRR, (2022)Acquisition Scenario Analysis for Face Recognition at a Distance., , , and . ISVC (1), volume 6453 of Lecture Notes in Computer Science, page 461-468. Springer, (2010)Fusion strategies in multimodal biometric verification., , and . ICME, page 5-8. IEEE Computer Society, (2003)Forensic Writer Identification Using Allographic Features., , , and . ICFHR, page 308-313. IEEE Computer Society, (2010)Fake fingertip generation from a minutiae template., , , , and . ICPR, page 1-4. IEEE Computer Society, (2008)