Author of the publication

Evaluating Biometric Encryption Key Generation Using Handwritten Signatures.

, , and . BLISS, page 17-22. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Universal Access Through Automated Assessment of Defined Clinical Populations., , and . User Interfaces for All, volume 3196 of Lecture Notes in Computer Science, page 42-49. Springer, (2004)A Versatile Iris Segmentation Algorithm., , , , and . BIOSIG, volume P-191 of LNI, page 137-150. GI, (2011)Identification of Shapes Using A Nonlinear Dynamic System., , , , and . ICVS, volume 2095 of Lecture Notes in Computer Science, page 236-255. Springer, (2001)Exploring the potential of facial skin regions for the provision of identity information., , and . ICDP, page 1-6. IET / IEEE, (2016)Age Sensitivity of Face Recognition Algorithms., , and . EST, page 12-15. IEEE Computer Society, (2013)Evaluating Biometric Encryption Key Generation Using Handwritten Signatures., , and . BLISS, page 17-22. IEEE Computer Society, (2008)Directed Gaze Trajectories for Biometric Presentation Attack Detection., , and . Sensors, 21 (4): 1394 (2021)An Attention-Guided Framework for Explainable Biometric Presentation Attack Detection., , and . Sensors, 22 (9): 3365 (2022)Spoofing Attempt Detection using Gaze Colocation., , and . BIOSIG, volume P-212 of LNI, page 135-146. GI, (2013)An Improved Learning Scheme for the Moving Window Classifier., and . ICDAR, page 607-611. IEEE Computer Society, (2001)