Author of the publication

User-Specific Iris Authentication Based on Feature Selection.

, , , , and . CSSE (1), page 1040-1043. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What Makes Social Search Efficient., , , , and . CoRR, (2019)Ontology-enabled Analysis of Study Populations., , , , , , , and . ISWC Satellites, volume 2456 of CEUR Workshop Proceedings, page 117-120. CEUR-WS.org, (2019)Predicting the Formation of Microporous Aluminophosphate AlPO4-5 Using Ridge Regression., , , and . FCST, page 483-488. IEEE Computer Society, (2010)Association Analysis and Content-Based Information Hiding Approach with High Hiding Capacity., , , , and . CIS (2), page 330-334. IEEE Computer Society, (2009)978-0-7695-3931-7.Hand-Based Personal Identification Using K-Means Clustering and Modified Zernike Moments., , , , and . ICNC (2), page 651-655. IEEE Computer Society, (2007)A Supervised Locality Preserving Projections Based Local Matching Algorithm for Face Recognition., , , and . AST/UCMA/ISA/ACN, volume 6059 of Lecture Notes in Computer Science, page 28-37. Springer, (2010)An Effective Video Steganography Method for Biometric Identification., , and . AST/UCMA/ISA/ACN, volume 6059 of Lecture Notes in Computer Science, page 469-479. Springer, (2010)PPV modelling of memristor-based oscillator., , and . CoRR, (2015)Linear discriminant projection embedding based on patches alignment., , , and . Image Vision Comput., 28 (12): 1624-1636 (2010)A novel image hiding approach based on correlation analysis for secure multimodal biometrics., , , , , and . J. Network and Computer Applications, 33 (3): 247-257 (2010)