Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile Face Recognition Systems: Exploring Presentation Attack Vulnerability and Usability., , and . ICB, page 1-7. IEEE, (2019)Segmentation-level Fusion for Iris Recogntion., , , and . BIOSIG, volume P-245 of LNI, page 61-72. GI, (2015)Image metric-based biometric comparators: A supplement to feature vector-based Hamming distance?, , , and . BIOSIG, volume P-196 of LNI, page 1-5. GI, (2012)additionally published as volume P-196 in the "Lecture Notes in Informatics" (LNI) series.Deep Iris Compression., , and . ICPR Workshops (5), volume 12665 of Lecture Notes in Computer Science, page 470-485. Springer, (2020)Exploring presentation attack vulnerability and usability of face recognition systems., , , and . IET Biom., 10 (2): 219-232 (2021)Selective encryption of the MC EZBC bitstream for DRM scenarios., and . MM&Sec, page 161-170. ACM, (2009)Isolating Iris Template Ageing in a Semi-Controlled Environment., , and . BIOSIG, volume P-260 of LNI, page 369-376. GI / IEEE, (2016)Mobile NIR Iris Recognition: Identifying Problems and Solutions., , , , and . BTAS, page 1-9. IEEE, (2018)To See or Not To See: Determining the Recognition Threshold of Encrypted Images., , and . EUVIP, page 1-6. IEEE, (2018)Subjective and objective quality assessment of transparently encrypted JPEG2000 images., , , , and . MM&Sec, page 247-252. ACM, (2010)