Author of the publication

Can a "poor" verification system be a "good" identification system? A preliminary study.

, and . WIFS, page 31-36. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Face Phylogeny Tree Using Basis Functions., and . CoRR, (2020)Special issue on "Multi-biometrics and Mobile-biometrics: Recent Advances and Future Research"., , , and . Image Vis. Comput., 32 (12): 1145-1146 (2014)Matching thermal to visible face images using hidden factor analysis in a cascaded subspace learning framework., and . Pattern Recognit. Lett., (2016)A comprehensive overview of biometric fusion., , and . Inf. Fusion, (2019)CIT-GAN: Cyclic Image Translation Generative Adversarial Network With Application in Iris Presentation Attack Detection., and . CoRR, (2020)Image-Level Iris Morph Attack., and . ICIP, page 3013-3017. IEEE, (2021)Iris Liveness Detection Competition (LivDet-Iris) - The 2020 Edition., , , , , , , , , and 13 other author(s). IJCB, page 1-9. IEEE, (2020)Impact of photometric transformations on PRNU estimation schemes: A case study using near infrared ocular images., and . IWBF, page 1-8. IEEE, (2018)From image to sensor: Comparative evaluation of multiple PRNU estimation schemes for identifying sensors from NIR iris images., and . IWBF, page 1-6. IEEE, (2017)Estimating Fingerprint Deformation., , and . ICBA, volume 3072 of Lecture Notes in Computer Science, page 249-255. Springer, (2004)