Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A JC-BioAPI Compliant Smart Card with Biometrics for Secure Access Control., and . AVBPA, volume 2688 of Lecture Notes in Computer Science, page 903-910. Springer, (2003)Multi-modal biometrics for mobile authentication., , , , , , , , , and 1 other author(s). IJCB, page 1-8. IEEE, (2014)Fake iris detection using structured light., , , and . ICASSP, page 8692-8696. IEEE, (2013)Back to the future: A fully automatic method for robust age progression., , , , and . ICPR, page 4226-4231. IEEE, (2016)An Evaluation of Error Confidence Interval Estimation Methods., , and . ICPR (3), page 103-106. IEEE Computer Society, (2004)Evaluation Techniques for Biometrics-Based Authentication Systems (FRR)., , and . ICPR, page 2831-2837. IEEE Computer Society, (2000)Anonymous and Revocable Fingerprint Recognition., , , and . CVPR, IEEE Computer Society, (2007)FPGA-Based Coprocessor for Text String Extraction., , and . CAMP, page 217-221. IEEE Computer Society, (2000)Securing CNN Model and Biometric Template using Blockchain., , , , and . BTAS, page 1-7. IEEE, (2019)Deepfake Catcher: Can a Simple Fusion be Effective and Outperform Complex DNNs?, and . CVPR Workshops, page 3791-3801. IEEE, (2024)