Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kholmatov, Alisher
add a person with the name Kholmatov, Alisher
 

Other publications of authors with the same name

Identity authentication using improved online signature verification method., and . Pattern Recognition Letters, 26 (15): 2400-2408 (2005)Realization of correlation attack against the fuzzy vault scheme., and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 68190O. SPIE, (2008)Hyperspectral image processing and display techniques in the context of forensic document investigation., , and . SIU, page 1-4. IEEE, (2012)Online Signature Verification Using Fourier Descriptors., and . EURASIP J. Adv. Sig. Proc., (2009)Biometric Authentication Using Online Signatures., and . ISCIS, volume 3280 of Lecture Notes in Computer Science, page 373-380. Springer, (2004)Turkish handwritten text recognition: a case of agglutinative languages., and . DRR, volume 5010 of SPIE Proceedings, page 227-233. SPIE, (2003)Passive millimeter-wave band data acquisition setup and associated image processing techniques., , , , and . SIU, page 1-4. IEEE, (2013)Offline signature verification using classifier combination of HOG and LBP features., , , and . IJCB, page 1-7. IEEE Computer Society, (2011)BioSecure signature evaluation campaign (BSEC'2009): Evaluating online signature algorithms depending on the quality of signatures., , , , , , , , , and 9 other author(s). Pattern Recognition, 45 (3): 993-1003 (2012)SUSIG: an on-line signature database, associated protocols and benchmark results., and . Pattern Anal. Appl., 12 (3): 227-236 (2009)