Author of the publication

A Scheme for Enhancing Security Using Multiple Fingerprints and the Fuzzy Vault.

, , and . DICTA, page 540-547. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive unsupervised learning of human actions., , , and . ICDP, page 1-6. IET / IEEE, (2009)A suspicious behaviour detection using a context space model for smart surveillance systems., , , and . Comput. Vis. Image Underst., 116 (2): 194-209 (2012)An Update-Describe Approach for Human Action Recognition in Surveillance Video., , , and . DICTA, page 270-275. IEEE Computer Society, (2010)Detecting Uncommon Trajectories., , , and . DICTA, page 398-404. IEEE Computer Society, (2008)Attitude Estimation for a Fixed-Wing Aircraft Using Horizon Detection and Optical Flow., , and . DICTA, page 485-492. IEEE Computer Society, (2007)Simulated Artificial Human Vision: The Effects of Spatial Resolution and Frame Rate on Mobility., , and . AMT, volume 138 of Frontiers in Artificial Intelligence and Applications, page 138-143. IOS Press, (2006)Early Results in Vision-based Map Building., , and . AMiRE, page 207-216. Springer, (2005)Visualizing Student Opinion Through Text Analysis., , and . IEEE Trans. Educ., 62 (4): 305-311 (2019)Texture for Script Identification., , and . IEEE Trans. Pattern Anal. Mach. Intell., 27 (11): 1720-1732 (2005)An image processing approach for estimating the number of live prawn larvae in water., , and . ISSPA, page 571-574. IEEE, (1999)