Author of the publication

Evaluation Techniques for Biometrics-Based Authentication Systems (FRR).

, , and . ICPR, page 2831-2837. IEEE Computer Society, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-modal biometrics for mobile authentication., , , , , , , , , and 1 other author(s). IJCB, page 1-8. IEEE, (2014)Biometric Recognition: Security and Privacy Concerns, , and . IEEE Security & Privacy, 1 (2): 33-42 (2003)Automated Medical Image Modality Recognition by Fusion of Visual and Text Information., , , , and . MICCAI (2), volume 8674 of Lecture Notes in Computer Science, page 487-495. Springer, (2014)Retail video analytics: an overview and survey., , , , , and . Video Surveillance and Transportation Imaging Applications, volume 8663 of SPIE Proceedings, page 86630X. SPIE, (2013)An Evaluation of Error Confidence Interval Estimation Methods., , and . ICPR (3), page 103-106. IEEE Computer Society, (2004)Evaluation Techniques for Biometrics-Based Authentication Systems (FRR)., , and . ICPR, page 2831-2837. IEEE Computer Society, (2000)Minutia Verification and Classification for Fingerprint Matching., , , , and . ICPR, page 1025-1029. IEEE Computer Society, (2000)Real-Time Traffic Sign Detection: An Evaluation Study., , and . ICPR, page 3033-3036. IEEE Computer Society, (2010)Accurate coverage summarization of UAV videos., , and . AIPR, page 1-5. IEEE Computer Society, (2014)An Extensible Language Interfacefor Robot Manipulation., , , , and . AGI, volume 7716 of Lecture Notes in Computer Science, page 21-30. Springer, (2012)