Author of the publication

On the security of non-invertible fingerprint template transforms.

, and . WIFS, page 81-85. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compact Deep Neural Networks for Device-Based Image Classification., , and . Mobile Cloud Visual Media Computing, Springer, (2015)Evidential Value of Automated Latent Fingerprint Comparison: An Empirical Approach., , and . IEEE Trans. Inf. Forensics Secur., 7 (6): 1752-1765 (2012)Fingerprint Template Protection: From Theory to Practice., , and . Security and Privacy in Biometrics, Springer, (2013)Biometric template transformation: a security analysis., , and . Media Forensics and Security, volume 7541 of SPIE Proceedings, page 75410O. SPIE, (2010)Cascade of Box (CABOX) Filters for Optimal Scale Space Approximation., , , , , and . CVPR Workshops, page 126-131. IEEE Computer Society, (2014)On matching latent fingerprints., , , and . CVPR Workshops, page 1-8. IEEE Computer Society, (2008)Mid-level feature based local descriptor selection for image search., , , , and . VCIP, page 1-6. IEEE, (2013)Alignment and bit extraction for secure fingerprint biometrics., , and . Media Forensics and Security, volume 7541 of SPIE Proceedings, page 75410N. SPIE, (2010)Privacy and security of features extracted from minutiae aggregates., , and . ICASSP, page 1826-1829. IEEE, (2010)Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme., and . ICPR (4), page 537-540. IEEE Computer Society, (2006)