Author of the publication

Biometric System Verification Close to "Real World" Conditions.

, , , , , , , , and . COST 2101/2102 Conference, volume 5707 of Lecture Notes in Computer Science, page 236-243. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the evaluation of human ratings for signature recognition., , , , and . ICCST, page 1-5. IEEE, (2016)Modeling the Complexity of Signature and Touch-Screen Biometrics using the Lognormality Principle., , , , , , and . The Lognormality Principle, volume 88 of Series in Machine Perception and Artificial Intelligence, World Scientific, (2020)edBB: Biometrics and Behavior for Assessing Remote Education., , , , and . CoRR, (2019)Biometric System Verification Close to "Real World" Conditions., , , , , , , , and . COST 2101/2102 Conference, volume 5707 of Lecture Notes in Computer Science, page 236-243. Springer, (2009)Fusion, User-Specific., and . Encyclopedia of Biometrics, Springer US, (2015)A Tutorial on Text-Independent Speaker Verification, , , , , , , , , and . Journal on Applied Signal Processing, (2004)The multiscenario multienvironment biosecure multimodal database (BMDB), , , , , , , , , and 22 other author(s). IEEE Trans Pattern Anal Mach Intell, 32 (6): 1097--1111 (2010)Minutiae-based enhanced fingerprint verification assessment relaying on image quality factors., , , and . ICIP (2), page 891-894. IEEE, (2003)AHUMADA: A large speech corpus in Spanish for speaker characterization and identification., , and . Speech Commun., 31 (2-3): 255-264 (2000)An evaluation of indirect attacks and countermeasures in fingerprint verification systems., , , and . Pattern Recognit. Lett., 32 (12): 1643-1651 (2011)