Author of the publication

Iris-biometric comparators: Minimizing trade-offs costs between computational performance and recognition accuracy.

, , and . ICDP, page 1-6. IET / IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An evaluation of adaptive numerical integration algorithms on parallel systems., and . Parallel Algorithms Appl., 18 (1-2): 27-47 (2003)Editorial., , and . Mathematics and Computers in Simulation, 62 (3-6): 217-218 (2003)Hardware-based JPEG 2000 video coding system., and . Real-Time Image Processing, volume 6496 of SPIE Proceedings, page 64960G. SPIE, (2007)Toward DRM for 3D geometry data., and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 68190V. SPIE, (2008)Towards standardised fingerprint matching robustness assessment: the StirMark toolkit - cross-database comparisons with minutiae-based matching., , and . IH&MMSec, page 111-116. ACM, (2013)Key-dependency for a wavelet-based blind watermarking algorithm., , and . MM&Sec, page 175-179. ACM, (2004)Multiple re-watermarking using varying non-stationary mra with parameterized wavelet filters., , and . MM&Sec, page 63-68. ACM, (2008)Subjective and objective quality assessment of transparently encrypted JPEG2000 images., , , , and . MM&Sec, page 247-252. ACM, (2010)A Novel Shape Feature Descriptor for the Classification of Polyps in HD Colonoscopy., , and . MCV, volume 8331 of Lecture Notes in Computer Science, page 205-213. Springer, (2013)Security Enhancement of Visual Hashes Through Key Dependent Wavelet Transformations., and . ICIAP, volume 3617 of Lecture Notes in Computer Science, page 543-550. Springer, (2005)