Остановите войну!
for scientists:
default search action
Ruud M. Bolle
- > Home > Persons > Ruud M. Bolle
Publications
- 2013
- [c59]Jonathan Connell, Nalini K. Ratha, James E. Gentile, Ruud M. Bolle:
Fake iris detection using structured light. ICASSP 2013: 8692-8696 - 2008
- [c58]Gaurav Aggarwal, Nalini K. Ratha, Ruud M. Bolle, Rama Chellappa:
Multi-biometric cohort analysis for biometric fusion. ICASSP 2008: 5224-5227 - [c57]Gaurav Aggarwal, Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle:
Physics-based revocable face recognition. ICASSP 2008: 5232-5235 - [c56]Achint Oommen Thomas, Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle:
Comparative analysis of registration based and registration free methods for cancelable fingerprint biometrics. ICPR 2008: 1-4 - 2007
- [j23]Nalini K. Ratha, Sharat Chikkerur, Jonathan H. Connell, Ruud M. Bolle:
Generating Cancelable Fingerprint Templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(4): 561-572 (2007) - [c55]Faisal Farooq, Ruud M. Bolle, Tsai-Yang Jea, Nalini K. Ratha:
Anonymous and Revocable Fingerprint Recognition. CVPR 2007 - [p2]Nalini K. Ratha, Ruud M. Bolle, Sharath Pankanti:
Large-Scale Biometric Identification: Challenges and Solutions. Image Pattern Recognition 2007: 269-288 - 2006
- [c54]Gaurav Aggarwal, Nalini K. Ratha, Ruud M. Bolle:
Biometric Verification: Looking Beyond Raw Similarity Scores. CVPR Workshops 2006: 31 - [c53]Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle, Sharat Chikkerur:
Cancelable Biometrics: A Case Study in Fingerprints. ICPR (4) 2006: 370-373 - [c52]Sharat Chikkerur, Sharath Pankanti, Alan Jea, Nalini K. Ratha, Ruud M. Bolle:
Fingerprint Representation Using Localized Texture Features. ICPR (4) 2006: 521-524 - 2005
- [c51]Ruud M. Bolle, Jonathan H. Connell, Sharath Pankanti, Nalini K. Ratha, Andrew W. Senior:
The Relation between the ROC Curve and the CMC. AutoID 2005: 15-20 - [c50]Sharat Chikkerur, Venu Govindaraju, Sharath Pankanti, Ruud M. Bolle, Nalini K. Ratha:
Novel Approaches for Minutiae Verification in Fingerprint Images. WACV/MOTION 2005: 111-116 - 2004
- [j21]Ruud M. Bolle, Nalini K. Ratha, Sharath Pankanti:
Error analysis of pattern recognition systems - the subsets bootstrap. Comput. Vis. Image Underst. 93(1): 1-33 (2004) - [j20]Chitra Dorai, Nalini K. Ratha, Ruud M. Bolle:
Dynamic behavior analysis in compressed fingerprint videos. IEEE Trans. Circuits Syst. Video Technol. 14(1): 58-73 (2004) - [c49]Nalini K. Ratha, Miguel A. Figueroa-Villanueva, Jonathan H. Connell, Ruud M. Bolle:
A Secure Protocol for Data Hiding in Compressed Fingerprint Images. ECCV Workshop BioAW 2004: 205-216 - [c48]Ruud M. Bolle, Nalini K. Ratha, Sharath Pankanti:
An Evaluation of Error Confidence Interval Estimation Methods. ICPR (3) 2004: 103-106 - [c47]Ruud M. Bolle, Sharath Pankanti, Jonathan H. Connell, Nalini K. Ratha:
Iris Individuality: A Partial Iris Model. ICPR (2) 2004: 927-930 - [c45]Ruud M. Bolle, Nalini K. Ratha, Sharath Pankanti:
Performance Evaluation in 1: 1 Biometric Engines. SINOBIOMETRICS 2004: 27-46 - 2003
- [j18]Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle:
Biometrics break-ins and band-aids. Pattern Recognit. Lett. 24(13): 2105-2113 (2003) - [c43]Miguel A. Figueroa-Villanueva, Nalini K. Ratha, Ruud M. Bolle:
A Comparative Performance Analysis of JPEG 2000 vs. WSQ for Fingerprint Image Compression. AVBPA 2003: 385-392 - [c42]Sunil J. Noronha, Chitra Dorai, Nalini K. Ratha, Ruud M. Bolle:
Architecture for Synchronous Multiparty Authentication Using Biometrics. AVBPA 2003: 609-616 - 2002
- [j17]Ruud M. Bolle, Jonathan H. Connell, Nalini K. Ratha:
Biometric perils and patches. Pattern Recognit. 35(12): 2727-2738 (2002) - [c40]Ruud M. Bolle, Andrew W. Senior, Nalini K. Ratha, Sharath Pankanti:
Fingerprint Minutiae: A Constructive Definition. Biometric Authentication 2002: 58-66 - [c38]Ruud M. Bolle, Nalini K. Ratha, Jonathan H. Connell:
Fingerprint image enhancement using weak models. ICIP (1) 2002: 45-48 - [c37]Sharath Pankanti, Nalini K. Ratha, Ruud M. Bolle:
Structure in Errors: A Case Study in Fingerprint Verification. ICPR (3) 2002: 440-447 - 2001
- [j16]Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle:
Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3): 614-634 (2001) - [c35]Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle:
An Analysis of Minutiae Matching Strength. AVBPA 2001: 223-228 - [c34]Nalini K. Ratha, Andrew W. Senior, Ruud M. Bolle:
Automated Biometrics. ICAPR 2001: 445-474 - [c32]Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle:
Secure fingerprint-based authentication for Lotus Notes®. MM&Sec 2001: 48-51 - [c31]Ruud M. Bolle, Nalini K. Ratha, Jonathan H. Connell:
Automated Biometrics: Security and Privacy. PRIS 2001: 2-11 - 2000
- [c30]Chitra Dorai, Nalini K. Ratha, Ruud M. Bolle:
Detecting Dynamic Behavior in Compressed Fingerprint Videos: Distortion. CVPR 2000: 2320-2326 - [c27]Ruud M. Bolle, Sharath Pankanti, Nalini K. Ratha:
Evaluation Techniques for Biometrics-Based Authentication Systems (FRR). ICPR 2000: 2831-2837 - [c25]Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle:
Secure data hiding in wavelet compressed fingerprint images. ACM Multimedia Workshops 2000: 127-130 - [c24]Nalini K. Ratha, Ruud M. Bolle, V. D. Pandit, V. Vaish:
Robust fingerprint authentication using local structural similarity. WACV 2000: 29-34 - 1998
- [c22]Ruud M. Bolle, Nalini K. Ratha, Sharath Pankanti:
Research Issues in Biometrics. ACCV (1) 1998: 2-9 - [c19]Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle:
Image mosaicing for rolled fingerprint construction. ICPR 1998: 1651-1653 - [c18]Nalini K. Ratha, Ruud M. Bolle:
Effect of controlled image acquisition on fingerprint matching. ICPR 1998: 1659-1661
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 02:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint