Author of the publication

Face Spoof Detection With Image Distortion Analysis.

, , and . IEEE Trans. Inf. Forensics Secur., 10 (4): 746-761 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evidence Accumulation Clustering Based on the K-Means Algorithm., and . SSPR/SPR, volume 2396 of Lecture Notes in Computer Science, page 442-451. Springer, (2002)Incorporating Image Quality in Multi-algorithm Fingerprint Verification., , , and . ICB, volume 3832 of Lecture Notes in Computer Science, page 213-220. Springer, (2006)Fusion of Local and Regional Approaches for On-Line Signature Verification., , , and . IWBRS, volume 3781 of Lecture Notes in Computer Science, page 188-196. Springer, (2005)Face modeling for recognition., and . ICIP (2), page 693-696. IEEE, (2001)Robust motion-based image segmentation using fusion., , , and . ICIP, page 3375-3378. IEEE, (2004)Pores and Ridges: High-Resolution Fingerprint Matching Using Level 3 Features., , and . IEEE Trans. Pattern Anal. Mach. Intell., 29 (1): 15-27 (2007)A feedback paradigm for latent fingerprint matching., , , and . ICB, page 1-8. IEEE, (2013)Latent orientation field estimation via convolutional neural network., and . ICB, page 349-356. IEEE, (2015)A longitudinal study of automatic face recognition., and . ICB, page 214-221. IEEE, (2015)Guidelines for best practices in biometrics research., , and . ICB, page 541-545. IEEE, (2015)