Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Face recognition based on neighbourhood discriminant preserving embedding., and . ICARCV, page 428-433. IEEE, (2008)Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing., , , , and . IEEE Trans. Inf. Forensics Secur., 13 (2): 393-407 (2018)Comparing the Performance of Principal Component Analysis and RBF Network for Face Recognition using Locally Linear Embedding., , and . IASSE, page 78-82. ISCA, (2005)Interpretable security analysis of cancellable biometrics using constrained-optimized similarity-based attack., , , , and . WACV (Workshops), page 70-77. IEEE, (2021)Offline Signature Verification through Biometric Strengthening., , and . AutoID, page 226-231. IEEE, (2007)FuzzyHash: A Secure Biometric Template Protection Technique., and . FBIT, page 688-694. IEEE Computer Society, (2007)Matching reduction of 2DPalmHash Code., , and . ISBAST, page 124-128. IEEE, (2014)Cancellable Biometrics and Multispace Random Projections.. CVPR Workshops, page 164. IEEE Computer Society, (2006)Weighted Discriminant Analysis and Kernel Ridge Regression Metric Learning for Face Verification., , and . ICONIP (2), volume 9948 of Lecture Notes in Computer Science, page 401-410. (2016)Automatic Digital Camera Based Fingerprint Image Preprocessing., , and . CGIV, page 182-189. IEEE Computer Society, (2006)