Author of the publication

Analysis, Comparison, and Assessment of Latent Fingerprint Image Preprocessing.

, , , , , , and . CVPR Workshops, page 628-635. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Biometrics Systems Include Users., , and . IEEE Syst. J., 3 (4): 461-468 (2009)Security Fatigue., , , and . IT Prof., 18 (5): 26-32 (2016)Character Strings, Memory and Passwords: What a Recall Study Can Tell Us., and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 195-206. Springer, (2014)Usability Standards across the Development Lifecycle., and . HCI (16), volume 6776 of Lecture Notes in Computer Science, page 130-137. Springer, (2011)Analysis, Comparison, and Assessment of Latent Fingerprint Image Preprocessing., , , , , , and . CVPR Workshops, page 628-635. IEEE Computer Society, (2017)Privacy and Security in the Brave New World: The Use of Multiple Mental Models., , , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 260-270. Springer, (2015)How the subject can improve fingerprint image quality., , , , and . J. Electronic Imaging, 17 (1): 011007 (2008)I Can't Type That! P@$$w0rd Entry on Mobile Devices., , , and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 160-171. Springer, (2014)Basing Cybersecurity Training on User Perceptions., , , and . IEEE Secur. Priv., 10 (2): 40-49 (2012)Book Review.. Int. J. Hum. Comput. Interact., 14 (3-4): 559-561 (2002)