Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving verification accuracy by synthesis of locally enhanced biometric images and deformable model, , and . Signal Processing, 87 (11): 2746--2764 (November 2007)Self-similarity representation of Weber faces for kinship classification., , and . BTAS, page 245-250. IEEE, (2012)Detecting medley of iris spoofing attacks using DESIST., , , , and . BTAS, page 1-6. IEEE, (2016)Automated clarity and quality assessment for latent fingerprints., , and . BTAS, page 1-6. IEEE, (2013)Age Transformation for Improving Face Recognition Performance., , , and . PReMI, volume 4815 of Lecture Notes in Computer Science, page 576-583. Springer, (2007)On Matching Faces with Alterations due to Plastic Surgery and Disguise., , , and . BTAS, page 1-7. IEEE, (2018)Learning A Shared Transform Model for Skull to Digital Face Image Matching., , , , and . BTAS, page 1-7. IEEE, (2018)Leap signature recognition using HOOF and HOT features., , and . ICIP, page 5012-5016. IEEE, (2014)Incremental subclass discriminant analysis: A case study in face recognition., , , and . ICIP, page 593-596. IEEE, (2012)Dual Directed Capsule Network for Very Low Resolution Image Recognition., , , and . ICCV, page 340-349. IEEE, (2019)