Author of the publication

Single- and cross- database benchmarks for gender classification under unconstrained settings.

, , , and . ICCV Workshops, page 2152-2159. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Is My Student at the Other Side? Applying Biometric Web Authentication to E-Learning Environments., , , and . ICALT, page 551-553. IEEE Computer Society, (2008)Shape-Driven Gabor Jets for Face Description and Authentication., and . IEEE Trans. Information Forensics and Security, 2 (4): 769-780 (2007)An Evaluation of Video-to-Video Face Verification., , , , , , , , , and 4 other author(s). IEEE Trans. Information Forensics and Security, 5 (4): 781-801 (2010)Security issues of Internet-based biometric authentication systems: risks of Man-in-the-Middle and BioPhishing on the example of BioWebAuth., , , , , , , and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 68190R. SPIE, (2008)A multiplatform Java wrapper for the BioAPI framework., , , and . Computer Standards & Interfaces, 31 (1): 186-191 (2009)A SOFM Improves a Real Time Quality Assurance Machine Vision System., , and . ICPR (4), page 301-304. IEEE Computer Society, (2004)The Role of Polarity in Haar-like Features for Face Detection., and . ICPR, page 412-415. IEEE Computer Society, (2010)Generalized Presentation Attack Detection: a face anti-spoofing evaluation proposal., , , , and . CoRR, (2019)The Multiscenario Multienvironment BioSecure Multimodal Database (BMDB)., , , , , , , , , and 22 other author(s). IEEE Trans. Pattern Anal. Mach. Intell., 32 (6): 1097-1111 (2010)Biometric Template Protection Using Universal Background Models: An Application to Online Signature., , , and . IEEE Trans. Information Forensics and Security, 7 (1): 269-282 (2012)