Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reconstruction of Fingerprints from Minutiae Using Conditional Adversarial Networks., , , and . IWDW, volume 11378 of Lecture Notes in Computer Science, page 353-362. Springer, (2018)Blind image deconvolution based on robust stable edge prediction., , , , , and . BHI, page 66-69. IEEE, (2016)Inter-level and intra-level deconvolution based image deblurring algorithm for wide field microscopy., , , , , , and . BMEI, page 90-95. IEEE, (2015)Label-guided snake for bone segmentation and its application on Medical Rapid Prototyping., , , , and . SMC, page 752-757. IEEE, (2011)A Fast Feature Extraction in Object Recognition Using Parallel processing on CPU and GPU., , , , and . SMC, page 3842-3847. IEEE, (2009)INHA: Localization of Mobile Robots Based on Feature Matching with a Single Camera., , , , and . SMC, page 2765-2770. IEEE, (2013)An Audio Copyright Protection Schemes Based on SMM in Cepstrum Domain., , , and . SSPR/SPR, volume 4109 of Lecture Notes in Computer Science, page 923-927. Springer, (2006)A method for blind image deblurring based on Gabor filter edge estimation., , , and . Int. J. Intell. Inf. Database Syst., 14 (3): 257-276 (2021)Fingerprint Generation and Presentation Attack Detection using Deep Neural Networks., , , and . MIPR, page 375-378. IEEE, (2019)Robust and accurate pattern matching in fuzzy space for fiducial mark alignment., , , and . Mach. Vis. Appl., 24 (3): 447-459 (2013)