Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coherence-based subband decomposition for robust speech and speaker recognition in noisy and reverberant rooms., , and . ICSLP, ISCA, (1998)Improving the competitiveness of discriminant neural networks in speaker verification., , , and . INTERSPEECH, ISCA, (2003)Increasing robustness in GMM speaker recognition systems for noisy and reverberant speech with low complexity microphone arrays., , , and . ICSLP, ISCA, (1996)Sensor Interoperability and Fusion in Fingerprint Verification: A Case Study using Minutiae-and Ridge-Based Matchers., , , , and . ICARCV, page 1-6. IEEE, (2006)Minutiae-based enhanced fingerprint verification assessment relaying on image quality factors., , , and . ICIP (2), page 891-894. (2003)DooDB: A Graphical Password Database Containing Doodles and Pseudo-Signatures., , , and . ICFHR, page 339-344. IEEE Computer Society, (2010)Kinematical Analysis of Synthetic Dynamic Signatures Using the Sigma-Lognormal Model., , , , , and . ICFHR, page 113-118. IEEE Computer Society, (2010)On the use of quality measures for text-independent speaker recognition., , , and . Odyssey, page 105-110. ISCA, (2004)Biosecure reference systems for on-line signature verification: A study of complementarity., , , , , , , , , and 5 other author(s). Annales des Télécommunications, 62 (1-2): 36-61 (2007)An evaluation of indirect attacks and countermeasures in fingerprint verification systems., , , and . Pattern Recognition Letters, 32 (12): 1643-1651 (2011)