Author of the publication

On the security of non-invertible fingerprint template transforms.

, and . WIFS, page 81-85. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fingerprint Template Protection: From Theory to Practice., , and . Security and Privacy in Biometrics, Springer, (2013)Biometric template transformation: a security analysis., , and . Media Forensics and Security, volume 7541 of SPIE Proceedings, page 75410O. SPIE, (2010)On matching latent fingerprints., , , and . CVPR Workshops, page 1-8. IEEE Computer Society, (2008)Cascade of Box (CABOX) Filters for Optimal Scale Space Approximation., , , , , and . CVPR Workshops, page 126-131. IEEE Computer Society, (2014)Mid-level feature based local descriptor selection for image search., , , , and . VCIP, page 1-6. IEEE, (2013)AKULA - Adaptive Cluster Aggregation for Visual Search., , , and . DCC, page 13-22. IEEE, (2014)Alignment and bit extraction for secure fingerprint biometrics., , and . Media Forensics and Security, volume 7541 of SPIE Proceedings, page 75410N. SPIE, (2010)Privacy and security of features extracted from minutiae aggregates., , and . ICASSP, page 1826-1829. IEEE, (2010)On the evidential value of fingerprints., , and . IJCB, page 1-8. IEEE Computer Society, (2011)Compact deep neural networks for device based image classification., , , and . ICME Workshops, page 1-6. IEEE Computer Society, (2015)