Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coherence-based subband decomposition for robust speech and speaker recognition in noisy and reverberant rooms., , and . ICSLP, ISCA, (1998)Improving the competitiveness of discriminant neural networks in speaker verification., , , and . INTERSPEECH, ISCA, (2003)DooDB: A Graphical Password Database Containing Doodles and Pseudo-Signatures., , , and . ICFHR, page 339-344. IEEE Computer Society, (2010)Kinematical Analysis of Synthetic Dynamic Signatures Using the Sigma-Lognormal Model., , , , , and . ICFHR, page 113-118. IEEE Computer Society, (2010)Increasing robustness in GMM speaker recognition systems for noisy and reverberant speech with low complexity microphone arrays., , , and . ICSLP, ISCA, (1996)Synthetic on-line signature generation. Part I: Methodology and algorithms., , , and . Pattern Recognition, 45 (7): 2610-2621 (2012)Biosecure reference systems for on-line signature verification: A study of complementarity., , , , , , , , , and 5 other author(s). Annales des Télécommunications, 62 (1-2): 36-61 (2007)Fusion, User-Specific., and . Encyclopedia of Biometrics, Springer US, (2015)An evaluation of indirect attacks and countermeasures in fingerprint verification systems., , , and . Pattern Recognition Letters, 32 (12): 1643-1651 (2011)Minutiae-based enhanced fingerprint verification assessment relaying on image quality factors., , , and . ICIP (2), page 891-894. (2003)