default search action
Nalini K. Ratha
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Akshay Agarwal, Mayank Vatsa, Richa Singh, Nalini K. Ratha:
Corruption depth: Analysis of DNN depth for misclassification. Neural Networks 172: 106013 (2024) - [j32]Nalini K. Ratha:
Message From the Editor-in-Chief. IEEE Trans. Biom. Behav. Identity Sci. 6(3): 288 (2024) - [j31]Shengcai Liao, Xiaoming Liu, Massimo Tistarelli, Rama Chellappa, Josef Kittler, Nalini K. Ratha:
Editorial. IEEE Trans. Biom. Behav. Identity Sci. 6(3): 289 (2024) - [c91]Akshay Agarwal, Nalini K. Ratha:
Deepfake Catcher: Can a Simple Fusion be Effective and Outperform Complex DNNs? CVPR Workshops 2024: 3791-3801 - [c90]Akshay Agarwal, Nalini K. Ratha:
Deepfake: Classifiers, Fairness, and Demographically Robust Algorithm. FG 2024: 1-9 - [c89]Bharat Yalavarthi, Arjun Ramesh Kaushik, Arun Ross, Vishnu Boddeti, Nalini K. Ratha:
Enhancing Privacy in Face Analytics Using Fully Homomorphic Encryption. FG 2024: 1-9 - [i15]Bharat Yalavarthi, Arjun Ramesh Kaushik, Arun Ross, Vishnu Boddeti, Nalini K. Ratha:
Enhancing Privacy in Face Analytics Using Fully Homomorphic Encryption. CoRR abs/2404.16255 (2024) - [i14]Vatsal Aggarwal, Arjun Ramesh Kaushik, Charanjit Jutla, Nalini K. Ratha:
Enhancing Privacy and Security of Autonomous UAV Navigation. CoRR abs/2404.17225 (2024) - [i13]Aditya Malik, Nalini K. Ratha, Bharat Yalavarthi, Tilak Sharma, Arjun Ramesh Kaushik, Charanjit Jutla:
Confidential and Protected Disease Classifier using Fully Homomorphic Encryption. CoRR abs/2405.02790 (2024) - 2023
- [j30]Akshay Agarwal, Mayank Vatsa, Richa Singh, Nalini K. Ratha:
Parameter agnostic stacked wavelet transformer for detecting singularities. Inf. Fusion 95: 415-425 (2023) - [j29]Akshay Agarwal, Richa Singh, Mayank Vatsa, Nalini K. Ratha:
IBAttack: Being Cautious About Data Labels. IEEE Trans. Artif. Intell. 4(6): 1484-1493 (2023) - [j28]Nalini K. Ratha:
Introduction of New Associate Editors in Chief. IEEE Trans. Biom. Behav. Identity Sci. 5(2): 151-153 (2023) - [c88]Akshay Agarwal, Nalini K. Ratha, Richa Singh, Mayank Vatsa:
Robustness Against Gradient based Attacks through Cost Effective Network Fine-Tuning. CVPR Workshops 2023: 28-37 - [c87]Ojaswee, Akshay Agarwal, Nalini K. Ratha:
Benchmarking Image Classifiers for Physical Out-of-Distribution Examples Detection. ICCV (Workshops) 2023: 4429-4437 - [c86]Gaurav Goswami, Akshay Agarwal, Nalini K. Ratha, Richa Singh, Mayank Vatsa:
Federated Learning for Local and Global Data Distribution. Tiny Papers @ ICLR 2023 - [c85]Akshay Agarwal, Nalini K. Ratha, Afzel Noore, Richa Singh, Mayank Vatsa:
Misclassifications of Contact Lens Iris PAD Algorithms: Is it Gender Bias or Environmental Conditions? WACV 2023: 961-970 - [c84]Tilak Sharma, Mahika Wason, Vishnu Boddeti, Arun Ross, Nalini K. Ratha:
Fully Homomorphic Encryption Operators for Score and Decision Fusion in Biometric Identification. WIFS 2023: 1-6 - [i12]Bhavin Jawade, Deen Dayal Mohan, Srirangaraj Setlur, Nalini K. Ratha, Venu Govindaraju:
RidgeBase: A Cross-Sensor Multi-Finger Contactless Fingerprint Dataset. CoRR abs/2307.05563 (2023) - 2022
- [j27]Nalini K. Ratha:
Introduction of New Associate Editors in Chief. IEEE Trans. Biom. Behav. Identity Sci. 4(2): 148 (2022) - [j26]Akshay Agarwal, Nalini K. Ratha, Mayank Vatsa, Richa Singh:
Crafting Adversarial Perturbations via Transformed Image Component Swapping. IEEE Trans. Image Process. 31: 7338-7349 (2022) - [j25]Akshay Agarwal, Gaurav Goswami, Mayank Vatsa, Richa Singh, Nalini K. Ratha:
DAMAD: Database, Attack, and Model Agnostic Adversarial Perturbation Detector. IEEE Trans. Neural Networks Learn. Syst. 33(8): 3277-3289 (2022) - [c83]Nayna Jain, Karthik Nandakumar, Nalini K. Ratha, Sharath Pankanti, Uttam Kumar:
PPDL - Privacy Preserving Deep Learning Using Homomorphic Encryption. COMAD/CODS 2022: 318-319 - [c82]Akshay Agarwal, Nalini K. Ratha, Mayank Vatsa, Richa Singh:
Exploring Robustness Connection between Artificial and Natural Adversarial Examples. CVPR Workshops 2022: 178-185 - [c81]Akshay Agarwal, Nalini K. Ratha, Mayank Vatsa, Richa Singh:
Benchmarking Robustness Beyond lp Norm Adversaries. ECCV Workshops (1) 2022: 342-359 - [c80]Bhavin Jawade, Deen Dayal Mohan, Srirangaraj Setlur, Nalini K. Ratha, Venu Govindaraju:
RidgeBase: A Cross-Sensor Multi-Finger Contactless Fingerprint Dataset. IJCB 2022: 1-9 - [c79]Luke Sperling, Nalini K. Ratha, Arun Ross, Vishnu Naresh Boddeti:
HEFT: Homomorphically Encrypted Fusion of Biometric Templates. IJCB 2022: 1-10 - [c78]Vishi Jain, Akshay Agarwal, Richa Singh, Mayank Vatsa, Nalini K. Ratha:
Robust IRIS Presentation Attack Detection Through Stochastic Filter Noise. ICPR 2022: 1134-1140 - [i11]Luke Sperling, Nalini K. Ratha, Arun Ross, Vishnu Naresh Boddeti:
HEFT: Homomorphically Encrypted Fusion of Biometric Templates. CoRR abs/2208.07241 (2022) - 2021
- [j24]Akshay Agarwal, Mayank Vatsa, Richa Singh, Nalini K. Ratha:
Cognitive data augmentation for adversarial defense via pixel masking. Pattern Recognit. Lett. 146: 244-251 (2021) - [j23]Nalini K. Ratha:
Greetings From the New Editor-in-Chief (EiC). IEEE Trans. Biom. Behav. Identity Sci. 3(4): 440 (2021) - [j22]Nalini K. Ratha, Richa Singh, Vitomir Struc, Ioannis A. Kakadiaris, P. Jonathon Phillips, Mayank Vatsa:
TBIOM Special Issue on "Best Reviewed Papers From IJCB 2020 - Editorial". IEEE Trans. Biom. Behav. Identity Sci. 3(4): 441-442 (2021) - [j21]Akshay Agarwal, Richa Singh, Mayank Vatsa, Nalini K. Ratha:
Image Transformation-Based Defense Against Adversarial Perturbation on Deep Learning Models. IEEE Trans. Dependable Secur. Comput. 18(5): 2106-2121 (2021) - [c77]Nayna Jain, Karthik Nandakumar, Nalini K. Ratha, Sharath Pankanti, Uttam Kumar:
CryptInfer: Enabling Encrypted Inference on Skin Lesion Images for Melanoma Detection. AIMLSystems 2021: 13:1-13:7 - [c76]Akshay Agarwal, Nalini K. Ratha:
Black-Box Adversarial Entry in Finance through Credit Card Fraud Detection. CIKM Workshops 2021 - [c75]Richa Singh, Mayank Vatsa, Nalini K. Ratha:
Trustworthy AI. COMAD/CODS 2021: 449-453 - [c74]Akshay Agarwal, Nalini K. Ratha, Mayank Vatsa, Richa Singh:
When Sketch Face Recognition Meets Mask Obfuscation: Database and Benchmark. FG 2021: 1-5 - [c73]Akshay Agarwal, Mayank Vatsa, Richa Singh, Nalini K. Ratha:
Intelligent and Adaptive Mixup Technique for Adversarial Robustness. ICIP 2021: 824-828 - [c72]Nayna Jain, Karthik Nandakumar, Nalini K. Ratha, Sharath Pankanti, Uttam Kumar:
Optimizing Homomorphic Encryption based Secure Image Analytics. MMSP 2021: 1-6 - [c71]Akshay Agarwal, Nalini K. Ratha, Mayank Vatsa, Richa Singh:
Impact of Super-Resolution and Human Identification in Drone Surveillance. WIFS 2021: 1-6 - [c70]Bhavin Jawade, Akshay Agarwal, Srirangaraj Setlur, Nalini K. Ratha:
Multi Loss Fusion For Matching Smartphone Captured Contactless Finger Images. WIFS 2021: 1-6 - [i10]Nayna Jain, Karthik Nandakumar, Nalini K. Ratha, Sharath Pankanti, Uttam Kumar:
Efficient CNN Building Blocks for Encrypted Data. CoRR abs/2102.00319 (2021) - [i9]Kanthi K. Sarpatwar, Karthik Nandakumar, Nalini K. Ratha, James T. Rayfield, Karthikeyan Shanmugam, Sharath Pankanti, Roman Vaculín:
Efficient Encrypted Inference on Ensembles of Decision Trees. CoRR abs/2103.03411 (2021) - 2020
- [j20]Karthik Nandakumar, Nalini K. Ratha, Sharath Pankanti, Alex Pentland, Maurice Herlihy:
Blockchain: From Technology to Marketplaces. Computer 53(7): 14-18 (2020) - [c69]Akhil Goel, Akshay Agarwal, Mayank Vatsa, Richa Singh, Nalini K. Ratha:
DNDNet: Reconfiguring CNN for Adversarial Robustness. CVPR Workshops 2020: 103-110 - [c68]Kanthi K. Sarpatwar, Nalini K. Ratha, Karthik Nandakumar, Karthikeyan Shanmugam, James T. Rayfield, Sharath Pankanti, Roman Vaculín:
Privacy Enhanced Decision Tree Inference. CVPR Workshops 2020: 154-159 - [c67]Akshay Agarwal, Mayank Vatsa, Richa Singh, Nalini K. Ratha:
Noise is Inside Me! Generating Adversarial Perturbations with Noise Derived from Natural Filters. CVPR Workshops 2020: 3354-3363 - [p3]Soumyadeep Ghosh, Richa Singh, Mayank Vatsa, Nalini K. Ratha, Vishal M. Patel:
Domain Adaptation for Visual Understanding. Domain Adaptation for Visual Understanding 2020: 1-15 - [e2]Richa Singh, Mayank Vatsa, Vishal M. Patel, Nalini K. Ratha:
Domain Adaptation for Visual Understanding. Springer 2020, ISBN 978-3-030-30670-0 [contents] - [i8]Akhil Goel, Akshay Agarwal, Mayank Vatsa, Richa Singh, Nalini K. Ratha:
Securing CNN Model and Biometric Template using Blockchain. CoRR abs/2008.00054 (2020) - [i7]Richa Singh, Mayank Vatsa, Nalini K. Ratha:
Trustworthy AI. CoRR abs/2011.02272 (2020)
2010 – 2019
- 2019
- [j19]Gaurav Goswami, Akshay Agarwal, Nalini K. Ratha, Richa Singh, Mayank Vatsa:
Detecting and Mitigating Adversarial Perturbations for Robust Face Recognition. Int. J. Comput. Vis. 127(6-7): 719-742 (2019) - [j18]Maneet Singh, Richa Singh, Mayank Vatsa, Nalini K. Ratha, Rama Chellappa:
Recognizing Disguised Faces in the Wild. IEEE Trans. Biom. Behav. Identity Sci. 1(2): 97-108 (2019) - [c66]Akhil Goel, Akshay Agarwal, Mayank Vatsa, Richa Singh, Nalini K. Ratha:
Securing CNN Model and Biometric Template using Blockchain. BTAS 2019: 1-7 - [c65]Karthik Nandakumar, Nalini K. Ratha, Sharath Pankanti, Shai Halevi:
Towards Deep Neural Network Training on Encrypted Data. CVPR Workshops 2019: 40-48 - [c64]Akhil Goel, Akshay Agarwal, Mayank Vatsa, Richa Singh, Nalini K. Ratha:
DeepRing: Protecting Deep Neural Network With Blockchain. CVPR Workshops 2019: 2821-2828 - [c63]Karthik Nandakumar, Nalini K. Ratha, Sharathchandra Pankanti:
Proving Multimedia Integrity using Sanitizable Signatures Recorded on Blockchain. IH&MMSec 2019: 151-160 - [i6]Michele Merler, Nalini K. Ratha, Rogério Schmidt Feris, John R. Smith:
Diversity in Faces. CoRR abs/1901.10436 (2019) - [i5]Shruti Nagpal, Maneet Singh, Richa Singh, Mayank Vatsa, Nalini K. Ratha:
Deep Learning for Face Recognition: Pride or Prejudiced? CoRR abs/1904.01219 (2019) - 2018
- [c62]Gaurav Goswami, Nalini K. Ratha, Akshay Agarwal, Richa Singh, Mayank Vatsa:
Unravelling Robustness of Deep Learning Based Face Recognition Against Adversarial Attacks. AAAI 2018: 6829-6836 - [c61]Akshay Agarwal, Richa Singh, Mayank Vatsa, Nalini K. Ratha:
Are Image-Agnostic Universal Adversarial Perturbations for Face Recognition Difficult to Detect? BTAS 2018: 1-7 - [c60]Rishabh Garg, Yashasvi Baweja, Soumyadeep Ghosh, Richa Singh, Mayank Vatsa, Nalini K. Ratha:
Heterogeneity Aware Deep Embedding for Mobile Periocular Recognition. BTAS 2018: 1-7 - [c59]Vineet Kushwaha, Maneet Singh, Richa Singh, Mayank Vatsa, Nalini K. Ratha, Rama Chellappa:
Disguised Faces in the Wild. CVPR Workshops 2018: 1-9 - [i4]Gaurav Goswami, Nalini K. Ratha, Akshay Agarwal, Richa Singh, Mayank Vatsa:
Unravelling Robustness of Deep Learning based Face Recognition Against Adversarial Attacks. CoRR abs/1803.00401 (2018) - [i3]Rishabh Garg, Yashasvi Baweja, Soumyadeep Ghosh, Mayank Vatsa, Richa Singh, Nalini K. Ratha:
Heterogeneity Aware Deep Embedding for Mobile Periocular Recognition. CoRR abs/1811.00846 (2018) - [i2]Maneet Singh, Richa Singh, Mayank Vatsa, Nalini K. Ratha, Rama Chellappa:
Recognizing Disguised Faces in the Wild. CoRR abs/1811.08837 (2018) - [i1]Vidya Muthukumar, Tejaswini Pedapati, Nalini K. Ratha, Prasanna Sattigeri, Chai-Wah Wu, Brian Kingsbury, Abhishek Kumar, Samuel Thomas, Aleksandra Mojsilovic, Kush R. Varshney:
Understanding Unequal Gender Classification Accuracy from Face Images. CoRR abs/1812.00099 (2018) - 2017
- [c58]Karthik Nandakumar, Nalini K. Ratha, Sharath Pankanti, Shelby Darnell:
Secure one-time biometrie tokens for non-repudiable multi-party transactions. WIFS 2017: 1-6 - 2016
- [c57]Yu Cheng, Nalini K. Ratha, Sharath Pankanti:
Outlier faces detector via efficient cohesive subgraph identification. ICIP 2016: 1659-1663 - [c56]Gaurav Goswami, Nalini K. Ratha, Richa Singh, Mayank Vatsa:
Improving classifier fusion via Pool Adjacent Violators normalization. ICPR 2016: 1011-1016 - [c55]Talha Ahmad Siddiqui, Samarth Bharadwaj, Tejas I. Dhamecha, Akshay Agarwal, Mayank Vatsa, Richa Singh, Nalini K. Ratha:
Face anti-spoofing with multifeature videolet aggregation. ICPR 2016: 1035-1040 - [c54]Xi Peng, Nalini K. Ratha, Sharathchandra Pankanti:
Learning face recognition from limited training data using deep neural networks. ICPR 2016: 1442-1447 - [c53]Christos Sagonas, Yannis Panagakis, Saritha Arunkumar, Nalini K. Ratha, Stefanos Zafeiriou:
Back to the future: A fully automatic method for robust age progression. ICPR 2016: 4226-4231 - 2015
- [j17]Nalini K. Ratha, Jonathan H. Connell, Sharath Pankanti:
Big Data approach to biometric-based identity analytics. IBM J. Res. Dev. 59(2/3) (2015) - [j16]Vishal M. Patel, Nalini K. Ratha, Rama Chellappa:
Cancelable Biometrics: A review. IEEE Signal Process. Mag. 32(5): 54-65 (2015) - 2014
- [j15]Himanshu S. Bhatt, Richa Singh, Mayank Vatsa, Nalini K. Ratha:
Improving Cross-Resolution Face Matching Using Ensemble-Based Co-Transfer Learning. IEEE Trans. Image Process. 23(12): 5654-5669 (2014) - [c52]Hagai Aronowitz, Min Li, Orith Toledo-Ronen, Sivan Harary, Amir B. Geva, Shay Ben-David, Asaf Rendel, Ron Hoory, Nalini K. Ratha, Sharath Pankanti, David Nahamoo:
Multi-modal biometrics for mobile authentication. IJCB 2014: 1-8 - 2013
- [c51]Min Li, Shenghua Bao, Weihong Qian, Zhong Su, Nalini K. Ratha:
Face recognition using early biologically inspired features. BTAS 2013: 1-6 - [c50]Jonathan Connell, Nalini K. Ratha, James E. Gentile, Ruud M. Bolle:
Fake iris detection using structured light. ICASSP 2013: 8692-8696 - [p2]Jaishanker K. Pillai, Vishal M. Patel, Rama Chellappa, Nalini K. Ratha:
Robust and Secure Iris Recognition. Handbook of Iris Recognition 2013: 183-204 - 2012
- [c49]Noel C. F. Codella, Jonathan Connell, Nalini K. Ratha, Jonathan W. Weinsaft:
Cardiac anatomy as a biometric. ICIP 2012: 1137-1140 - [c48]Himanshu S. Bhatt, Richa Singh, Mayank Vatsa, Nalini K. Ratha:
Matching cross-resolution face images using co-transfer learning. ICIP 2012: 1453-1456 - [c47]Vivek Tyagi, Hima P. Karanam, Tanveer A. Faruquie, L. Venkata Subramaniam, Nalini K. Ratha:
Fusing biographical and biometric classifiers for improved person identification. ICPR 2012: 2351-2354 - 2011
- [j14]Sharath Pankanti, Lisa M. Brown, Jonathan H. Connell, Ankur Datta, Quanfu Fan, Rogério Schmidt Feris, Norman Haas, Ying Li, Nalini K. Ratha, Hoang Trinh:
Practical computer vision: Example techniques and challenges. IBM J. Res. Dev. 55(5): 3 (2011) - [j13]Jaishanker K. Pillai, Vishal M. Patel, Rama Chellappa, Nalini K. Ratha:
Secure and Robust Iris Recognition Using Random Projections and Sparse Representations. IEEE Trans. Pattern Anal. Mach. Intell. 33(9): 1877-1893 (2011) - [c46]Vivek Tyagi, Nalini K. Ratha:
Biometric score fusion through discriminative training. CVPR Workshops 2011: 145-149 - 2010
- [c45]Jayanta Basak, Kiran Kate, Vivek Tyagi, Nalini K. Ratha:
QPLC: A novel multimodal biometric score fusion method. CVPR Workshops 2010: 46-52 - [c44]V. Ramakrishnan, Nalini K. Ratha:
Redundancy and diversity measure inspired biometrics fusion. CVPR Workshops 2010: 61-66 - [c43]Jaishanker K. Pillai, Vishal M. Patel, Rama Chellappa, Nalini K. Ratha:
Sectored Random Projections for Cancelable Iris Biometrics. ICASSP 2010: 1838-1841 - [c42]Nalini K. Ratha:
Privacy Protection in High Security Biometrics Applications. ICEB 2010: 62-69 - [c41]Jayanta Basak, Kiran Kate, Vivek Tyagi, Nalini K. Ratha:
A Gradient Descent Approach for Multi-modal Biometric Identification. ICPR 2010: 1322-1325
2000 – 2009
- 2008
- [c40]Jinyu Zuo, Nalini K. Ratha, Jonathan H. Connell:
A new approach for iris segmentation. CVPR Workshops 2008: 1-6 - [c39]Gaurav Aggarwal, Nalini K. Ratha, Ruud M. Bolle, Rama Chellappa:
Multi-biometric cohort analysis for biometric fusion. ICASSP 2008: 5224-5227 - [c38]Gaurav Aggarwal, Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle:
Physics-based revocable face recognition. ICASSP 2008: 5232-5235 - [c37]Achint Oommen Thomas, Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle:
Comparative analysis of registration based and registration free methods for cancelable fingerprint biometrics. ICPR 2008: 1-4 - [c36]Jinyu Zuo, Nalini K. Ratha, Jonathan H. Connell:
Cancelable iris biometric. ICPR 2008: 1-4 - 2007
- [j12]Nalini K. Ratha, Sharat Chikkerur, Jonathan H. Connell, Ruud M. Bolle:
Generating Cancelable Fingerprint Templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(4): 561-572 (2007) - [j11]Bir Bhanu, Nalini K. Ratha, B. V. K. Vijaya Kumar, Rama Chellappa, Josef Bigün:
Guest Editorial: Special Issue on Human Detection and Recognition. IEEE Trans. Inf. Forensics Secur. 2(3-2): 489-490 (2007) - [j10]K. W. Boyer, Venu Govindaraju, Nalini K. Ratha:
Introduction to the Special Issue on Recent Advances in Biometric Systems [Guest Editorial]. IEEE Trans. Syst. Man Cybern. Part B 37(5): 1091-1095 (2007) - [c35]Faisal Farooq, Ruud M. Bolle, Tsai-Yang Jea, Nalini K. Ratha:
Anonymous and Revocable Fingerprint Recognition. CVPR 2007 - [p1]Nalini K. Ratha, Ruud M. Bolle, Sharath Pankanti:
Large-Scale Biometric Identification: Challenges and Solutions. Image Pattern Recognition 2007: 269-288 - 2006
- [c34]Gaurav Aggarwal, Nalini K. Ratha, Ruud M. Bolle:
Biometric Verification: Looking Beyond Raw Similarity Scores. CVPR Workshops 2006: 31 - [c33]Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle, Sharat Chikkerur:
Cancelable Biometrics: A Case Study in Fingerprints. ICPR (4) 2006: 370-373 - [c32]Sharat Chikkerur, Sharath Pankanti, Alan Jea, Nalini K. Ratha, Ruud M. Bolle:
Fingerprint Representation Using Localized Texture Features. ICPR (4) 2006: 521-524 - 2005
- [c31]Ruud M. Bolle, Jonathan H. Connell, Sharath Pankanti, Nalini K. Ratha, Andrew W. Senior:
The Relation between the ROC Curve and the CMC. AutoID 2005: 15-20 - [c30]Sharat Chikkerur, Nalini K. Ratha:
Impact of Singular Point Detection on Fingerprint Matching Performance. AutoID 2005: 207-212 - [c29]John R. Smith, David S. Doermann, Amarnath Gupta, Jonathan Goldstein, Uri Shaft, Nalini K. Ratha:
Multimedia applications: beyond similarity searches. CVDB 2005: 71-72 - [c28]Sharat Chikkerur, Venu Govindaraju, Sharath Pankanti, Ruud M. Bolle, Nalini K. Ratha:
Novel Approaches for Minutiae Verification in Fingerprint Images. WACV/MOTION 2005: 111-116 - [e1]Takeo Kanade, Anil K. Jain, Nalini K. Ratha:
Audio- and Video-Based Biometric Person Authentication, 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, USA, July 20-22, 2005, Proceedings. Lecture Notes in Computer Science 3546, Springer 2005, ISBN 3-540-27887-7 [contents] - 2004
- [j9]Ruud M. Bolle, Nalini K. Ratha, Sharath Pankanti:
Error analysis of pattern recognition systems - the subsets bootstrap. Comput. Vis. Image Underst. 93(1): 1-33 (2004) - [j8]Chitra Dorai, Nalini K. Ratha, Ruud M. Bolle:
Dynamic behavior analysis in compressed fingerprint videos. IEEE Trans. Circuits Syst. Video Technol. 14(1): 58-73 (2004) - [c27]Nalini K. Ratha, Miguel A. Figueroa-Villanueva, Jonathan H. Connell, Ruud M. Bolle:
A Secure Protocol for Data Hiding in Compressed Fingerprint Images. ECCV Workshop BioAW 2004: 205-216 - [c26]Ruud M. Bolle, Nalini K. Ratha, Sharath Pankanti:
An Evaluation of Error Confidence Interval Estimation Methods. ICPR (3) 2004: 103-106 - [c25]Ruud M. Bolle, Sharath Pankanti, Jonathan H. Connell, Nalini K. Ratha:
Iris Individuality: A Partial Iris Model. ICPR (2) 2004: 927-930 - [c24]Ruud M. Bolle, Nalini K. Ratha, Sharath Pankanti:
Performance Evaluation in 1: 1 Biometric Engines. SINOBIOMETRICS 2004: 27-46 - 2003
- [j7]Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle:
Biometrics break-ins and band-aids. Pattern Recognit. Lett. 24(13): 2105-2113 (2003) - [c23]Miguel A. Figueroa-Villanueva, Nalini K. Ratha, Ruud M. Bolle:
A Comparative Performance Analysis of JPEG 2000 vs. WSQ for Fingerprint Image Compression. AVBPA 2003: 385-392 - [c22]Sunil J. Noronha, Chitra Dorai, Nalini K. Ratha, Ruud M. Bolle:
Architecture for Synchronous Multiparty Authentication Using Biometrics. AVBPA 2003: 609-616 - [c21]Michael Osborne, Nalini K. Ratha:
A JC-BioAPI Compliant Smart Card with Biometrics for Secure Access Control. AVBPA 2003: 903-910 - 2002
- [j6]Ruud M. Bolle, Jonathan H. Connell, Nalini K. Ratha:
Biometric perils and patches. Pattern Recognit. 35(12): 2727-2738 (2002) - [c20]Ruud M. Bolle, Andrew W. Senior, Nalini K. Ratha, Sharath Pankanti:
Fingerprint Minutiae: A Constructive Definition. Biometric Authentication 2002: 58-66 - [c19]Ruud M. Bolle, Nalini K. Ratha, Jonathan H. Connell:
Fingerprint image enhancement using weak models. ICIP (1) 2002: 45-48 - [c18]Sharath Pankanti, Nalini K. Ratha, Ruud M. Bolle:
Structure in Errors: A Case Study in Fingerprint Verification. ICPR (3) 2002: 440-447 - 2001
- [j5]Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle:
Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3): 614-634 (2001) - [c17]Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle:
An Analysis of Minutiae Matching Strength. AVBPA 2001: 223-228 - [c16]Nalini K. Ratha, Andrew W. Senior, Ruud M. Bolle:
Automated Biometrics. ICAPR 2001: 445-474 - [c15]Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle:
Secure fingerprint-based authentication for Lotus Notes®. MM&Sec 2001: 48-51 - [c14]Ruud M. Bolle, Nalini K. Ratha, Jonathan H. Connell:
Automated Biometrics: Security and Privacy. PRIS 2001: 2-11 - 2000
- [c13]Nalini K. Ratha, Anil K. Jain, Diane T. Rover:
FPGA-Based Coprocessor for Text String Extraction. CAMP 2000: 217-221 - [c12]Chitra Dorai, Nalini K. Ratha, Ruud M. Bolle:
Detecting Dynamic Behavior in Compressed Fingerprint Videos: Distortion. CVPR 2000: 2320-2326 - [c11]Ruud M. Bolle, Sharath Pankanti, Nalini K. Ratha:
Evaluation Techniques for Biometrics-Based Authentication Systems (FRR). ICPR 2000: 2831-2837 - [c10]Sugata Ghosal, Raghavendra Udupa, Nalini K. Ratha, Sharath Pankanti:
Hierarchical Partitioned Least Squares Filter-Bank for Fingerprint Enhancement. ICPR 2000: 3338-3341 - [c9]Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle:
Secure data hiding in wavelet compressed fingerprint images. ACM Multimedia Workshops 2000: 127-130 - [c8]Sugata Ghosal, Raghavendra Udupa, Sharath Pankanti, Nalini K. Ratha:
Learning partitioned least squares filters for fingerprint enhancement. WACV 2000: 2-7 - [c7]Nalini K. Ratha, Ruud M. Bolle, V. D. Pandit, V. Vaish:
Robust fingerprint authentication using local structural similarity. WACV 2000: 29-34
1990 – 1999
- 1999
- [j4]Nalini K. Ratha, Anil K. Jain:
Computer Vision Algorithms on Reconfigurable Logic Arrays. IEEE Trans. Parallel Distributed Syst. 10(1): 29-43 (1999) - 1998
- [c6]Ruud M. Bolle, Nalini K. Ratha, Sharath Pankanti:
Research Issues in Biometrics. ACCV (1) 1998: 2-9 - [c5]Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle:
Image mosaicing for rolled fingerprint construction. ICPR 1998: 1651-1653 - [c4]Nalini K. Ratha, Ruud M. Bolle:
Effect of controlled image acquisition on fingerprint matching. ICPR 1998: 1659-1661 - 1997
- [j3]Anil K. Jain, Nalini K. Ratha, Sridhar Lakshmanan:
Object detection using gabor filters. Pattern Recognit. 30(2): 295-309 (1997) - 1996
- [j2]Nalini K. Ratha, Kalle Karu, Shaoyun Chen, Anil K. Jain:
A Real-Time Matching System for Large Fingerprint Databases. IEEE Trans. Pattern Anal. Mach. Intell. 18(8): 799-813 (1996) - [c3]Nalini K. Ratha, Anil K. Jain, Diane T. Rover:
FPGA-based high performance page layout segmentation. Great Lakes Symposium on VLSI 1996: 29-34 - 1995
- [j1]Nalini K. Ratha, Shaoyun Chen, Anil K. Jain:
Adaptive flow orientation-based feature extraction in fingerprint images. Pattern Recognit. 28(11): 1657-1672 (1995) - [c2]Nalini K. Ratha, Anil K. Jain, Diane T. Rover:
Convolution on Splash 2. FCCM 1995: 204-213 - 1994
- [c1]Dan Judd, Nalini K. Ratha, Philip K. McKinley, John Weng, Anil K. Jain:
Parallel implementation of vision algorithms on workstation clusters. ICPR (3) 1994: 317-321
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-11 17:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint