Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spoofing 2D Face Recognition Systems with 3D Masks., and . BIOSIG, volume P-212 of LNI, page 209-216. GI, (2013)On the detection of morphing attacks generated by GANs., and . BIOSIG, volume P-329 of LNI, page 54-62. IEEE / Gesellschaft für Informatik e.V., (2022)HMM and IOHMM for the Recognition of Mono- and Bi-Manual 3D Hand Gestures., , and . BMVC, page 1-10. BMVA Press, (2004)Anti-spoofing in Action: Joint Operation with a Verification System., , and . CVPR Workshops, page 98-104. IEEE Computer Society, (2013)Heterogeneous Face Recognition Using Inter-Session Variability Modelling., and . CVPR Workshops, page 179-186. IEEE Computer Society, (2016)Towards quantifying the entropy of fingervein patterns across different feature extractors., and . ISBA, page 1-8. IEEE, (2018)Hand Posture Classification and Recognition using the Modified Census Transform., , and . FGR, page 351-356. IEEE Computer Society, (2006)Visual processing-inspired fern-audio features for noise-robust speaker verification., and . SAC, page 1491-1495. ACM, (2010)End-to-End convolutional neural network-based voice presentation attack detection., , and . IJCB, page 335-341. IEEE, (2017)Biometric Face Authentication Using Pixel-Based Weak Classifiers., and . ECCV Workshop BioAW, volume 3087 of Lecture Notes in Computer Science, page 24-31. Springer, (2004)