Author of the publication

Biometric template transformation: a security analysis.

, , and . Media Forensics and Security, volume 7541 of SPIE Proceedings, page 75410O. SPIE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BioSAKE: Biometrics-based secure authentication and key exchange.. ICB, page 1-8. IEEE, (2013)Blockchain: From Technology to Marketplaces., , , , and . Computer, 53 (7): 14-18 (2020)Optimizing Homomorphic Encryption based Secure Image Analytics., , , , and . MMSP, page 1-6. IEEE, (2021)PPDL - Privacy Preserving Deep Learning Using Homomorphic Encryption., , , , and . COMAD/CODS, page 318-319. ACM, (2022)A Unified Model for Face Matching and Presentation Attack Detection using an Ensemble of Vision Transformer Features., and . WACV (Workshops), page 662-671. IEEE, (2023)Evading Forensic Classifiers with Attribute-Conditioned Adversarial Faces., , and . CVPR, page 16469-16478. IEEE, (2023)FeSViBS: Federated Split Learning of Vision Transformer with Block Sampling., , , and . MICCAI (2), volume 14221 of Lecture Notes in Computer Science, page 350-360. Springer, (2023)Fusion in Multibiometric Identification Systems: What about the Missing Data?., , and . ICB, volume 5558 of Lecture Notes in Computer Science, page 743-752. Springer, (2009)Hardening Fingerprint Fuzzy Vault Using Password., , and . ICB, volume 4642 of Lecture Notes in Computer Science, page 927-937. Springer, (2007)Self-Ensembling Vision Transformer (SEViT) for Robust Medical Image Classification., , and . MICCAI (3), volume 13433 of Lecture Notes in Computer Science, page 376-386. Springer, (2022)