Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting the vulnerability of biometric systems to attacks based on morphed biometric information., , , and . IET Biom., 7 (4): 333-341 (2018)On the Detection of GAN-Based Face Morphs Using Established Morph Detectors., , , , , , , and . ICIAP (2), volume 11752 of Lecture Notes in Computer Science, page 345-356. Springer, (2019)Morph Deterction from Single Face Image: a Multi-Algorithm Fusion Approach., , and . ICBEA, page 6-12. ACM, (2018)Face Recognition Systems Under Morphing Attacks: A Survey., , , , and . IEEE Access, (2019)Unit-Selection Attack Detection Based on Unfiltered Frequency-Domain Features., , , and . INTERSPEECH, page 2209-2213. ISCA, (2016)Face Morphing Attack Detection Methods., , and . Handbook of Digital Face Manipulation and Detection, Springer, (2022)Binarization of spectral histogram models: An application to efficient biometric identification., , , and . CYBCONF, page 501-506. IEEE, (2015)Detecting Morphed Face Images Using Facial Landmarks., , , and . ICISP, volume 10884 of Lecture Notes in Computer Science, page 444-452. Springer, (2018)PRNU Variance Analysis for Morphed Face Image Detection., , , , and . BTAS, page 1-9. IEEE, (2018)Biometric Systems under Morphing Attacks: Assessment of Morphing Techniques and Vulnerability Reporting., , , , , , , , , and 3 other author(s). BIOSIG, volume P-270 of LNI, page 149-159. GI / IEEE, (2017)