Author of the publication

Pre- and Post-fingerprint Skeleton Enhancement for Minutiae Extraction.

, , and . CVIP (1), volume 459 of Advances in Intelligent Systems and Computing, page 453-465. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

WEBTRACLUS: a spatio-temporal trajectory clustering tool for personalization in healthcare web portals., , and . PETRA, page 65. ACM, (2011)Parallel Implementation of Octtree Generation Algorithm., , and . ICIP (3), page 1005-1009. IEEE Computer Society, (1998)Combining Chain-Code and Fourier Descriptors for Fingerprint Matching., and . ACC (3), volume 192 of Communications in Computer and Information Science, page 460-468. Springer, (2011)Extracting Extended Web Logs to Identify the Origin of Visits and Search Keywords., and . ISI, volume 182 of Advances in Intelligent Systems and Computing, page 435-441. Springer, (2012)Mining Web Logs to Identify Search Engine Behaviour at Websites., and . Informatica (Slovenia), (2013)Pre- and Post-fingerprint Skeleton Enhancement for Minutiae Extraction., , and . CVIP (1), volume 459 of Advances in Intelligent Systems and Computing, page 453-465. Springer, (2016)Fingerprint reference point identification based on chain encoded discrete curvature and bending energy., , and . Pattern Anal. Appl., 20 (1): 253-267 (2017)Array Based Java Source Code Obfuscation Using Classes with Restructured Arrays, and . CoRR, (2008)JConstHide: A Framework for Java Source Code Constant Hiding, and . CoRR, (2009)Securing SQLJ Source Codes from Business Logic Disclosure by Data Hiding Obfuscation, and . CoRR, (2012)