Filters








188 Hits in 7.7 sec

A Survey of Iris Biometrics Research: 2008–2010 [chapter]

Kevin W. Bowyer, Karen P. Hollingsworth, Patrick J. Flynn
2012 Handbook of Iris Recognition  
A recent survey of iris biometric research from its inception through 2007, roughly 15 years of research, lists approximately 180 publications.  ...  Research in iris biometrics has expanded so much that, although covering only three years and intentionally being selective about coverage, this new survey lists a larger number of references than the  ...  supported by the Federal Bureau of Investigation, the Central Intelligence Agency, the Intelligence Advanced Research Projects Activity, the Biometrics Task Force, the Technical Support Working Group under US  ... 
doi:10.1007/978-1-4471-4402-1_2 dblp:series/acvpr/BowyerHF13 fatcat:jrofnoks6bfcjetnoftvx64dou

A Robust Eyelashes And Eyelid Detection In Transformation Invariant Iris Recognition: In Application With Lrc Security System

R. Bremananth
2017 Zenodo  
Recognition performance is significantly improved based on the contributed schemes by evaluating real-life irises. Furthermore, the framework has been implemented using Java programming language.  ...  Biometric authentication is an essential task for any kind of real-life applications.  ...  Iris Administration Registration of new user: After the user, personal information is entered and then bio-metric camera is enabled to acquire eye images of users.  ... 
doi:10.5281/zenodo.1129700 fatcat:zgq6wsmprres3cfcer57svpcn4

Live Spoofing Detection for Automatic Human Activity Recognition Applications

Viktor Dénes Huszár, Vamsi Kiran Adhikarla
2021 Sensors  
To this end, we propose a deep learning based approach that can be used to detect spoofing in various fields such as border control, institutional security and public safety by surveillance cameras.  ...  In these applications, sensors such as smart phone cameras, web cameras or CCTV cameras are used for detecting and tracking physical activities of users.  ...  Texture analysis approaches make use of this observation for spoofing detection [19] [20] [21] .  ... 
doi:10.3390/s21217339 pmid:34770646 pmcid:PMC8587143 fatcat:tezm3v5vlbdq7ojczxtsks53ji

Hand-based multibiometric systems: state-of-the-art and future challenges

Anum Aftab, Farrukh Aslam Khan, Muhammad Khurram Khan, Haider Abbas, Waseem Iqbal, Farhan Riaz
2021 PeerJ Computer Science  
In this paper, we aim to focus on the existing multibiometric systems that use hand based modalities for the identification of individuals.  ...  We cover the existing multibiometric systems in the context of various feature extraction schemes, along with an analysis of their performance using one of the performance measures used for biometric systems  ...  ADDITIONAL INFORMATION AND DECLARATIONS Funding This project was funded by the National Plan for Science, Technology and Innovation (MAARIFAH), King Abdulaziz City for Science and Technology, Kingdom of  ... 
doi:10.7717/peerj-cs.707 pmid:34712793 pmcid:PMC8507475 fatcat:aejhjsxfbnhtzeiyggynamkbim

An Innovative Scheme For Effectual Fingerprint Data Compression Using Bezier Curve Representations [article]

Vani Perumal, Jagannathan Ramaswamy
2009 arXiv   pre-print
Several researchers have presented approaches for fingerprint image compression. In this paper, we propose a novel and efficient scheme for fingerprint image compression.  ...  Initially, the ridges present in the fingerprint image are extracted along with their coordinate values using the approach presented.  ...  The term "biometrics" is derived from the Greek words -"bio" which means life and "metrics" which means to measure.  ... 
arXiv:0911.0499v1 fatcat:y45ki6mporcvnap364kfsfp55q

Biometrics: In Search of Identity and Security (Q & A)

Zahid Akhtar, Abdenour Hadid, Mark Nixon, Massimo Tistarelli, Jean-Luc Dugelay, Sebastien Marcel
2017 IEEE Multimedia  
To address the issues like identity theft and security threats, a continuously evolving technology known as biometrics is presently being deployed in a wide range of personal, government, and commercial  ...  ACKNOWLEDGMENT This research work has been partially supported by a grant from the European Commission (H2020 MSCA RISE 690907 "IDENTITY").  ...  Of late, researchers have studied the ways genes influence facial development, and devised mathematically a computer program that can construct facial features of a person using genetic markers from their  ... 
doi:10.1109/mmul.2017.265090754 fatcat:lab3frtx2na6tc65gcp4cxfdqm

◾ Biometric Signature for Mobile Devices [chapter]

2016 Biometrics in a Data Driven World  
CCC is a not-for-profit organization that provides licenses and registration for a variety of users.  ...  For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged.  ...  Examples for combining minutia-and texture-based approaches can be found in References 62, 69, and 70. Also, a full study of combining di erent ngerprint recognition systems is done in Reference 71.  ... 
doi:10.1201/9781315317083-26 fatcat:4xrirexm3bf3dd5go5wttzddbm

Multimedia Internet of Things: A Comprehensive Survey

Ali Nauman, Yazdan Ahmad Qadri, Muhammad Amjad, Yousaf Bin Zikria, Muhammad Khalil Afzal, Sung Won Kim
2020 IEEE Access  
Moreover, we explore the limitations of IoT for multimedia computing and present the relationship between the M-IoT and emerging technologies including event processing, feature extraction, cloud computing  ...  We also present the need for better routing and Physical-Medium Access Control (PHY-MAC) protocols for M-IoT.  ...  Fig. 6 shows the M-IoT application of security and surveillance for habitat monitoring. a: BIO-METRIC AUTHENTICATION Al-alem et al.  ... 
doi:10.1109/access.2020.2964280 fatcat:ilihkpik65bdvblyal6rp7tb2y

On How Crowdsourced Data and Landscape Organisation Metrics Can Facilitate the Mapping of Cultural Ecosystem Services: An Estonian Case Study

Oleksandr Karasov, Stien Heremans, Mart Külvik, Artem Domnich, Igor Chervanyov
2020 Land  
Moreover, by means of a comparative viewshed analysis, we compare the geographic information system- and remote sensing-based landscape organisation metrics related to landscape coherence and colour harmony  ...  Therefore, recent studies are increasingly recognising passively crowdsourced geotagged photographs retrieved from location-based social media as suitable data for quantitative mapping and assessment of  ...  We credit Olha Kaminska (University of Ghent, Belgium) for the methodological suggestion to use topic modelling, and Ms. Edith Chenault, who provided English proofreading for the manuscript.  ... 
doi:10.3390/land9050158 fatcat:67l3h6u7bzcgrlzpo55y5g7m5e

LIRE

Mathias Lux, Michael Riegler, Pål Halvorsen, Konstantin Pogorelov, Nektarios Anagnostopoulos
2016 Proceedings of the 7th International Conference on Multimedia Systems - MMSys '16  
Then, we designed and developed a set of lesion and findings detection and localization approaches based on hand-crafted methods as well as on global-, local-and deepfeature-based methods, which serves  ...  DeepEIR system is being prepared for a broad testing and using under clinical conditions within our collaborating hospitals.  ...  , and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.  ... 
doi:10.1145/2910017.2910630 dblp:conf/mmsys/LuxRHPA16 fatcat:jfweprlxfzb2lommgkw6nqqwi4

Improvement of Packaging Circularity through the Application of Reusable Beverage Cup Reuse Models at Outdoor Festivals and Events

Valdonė Šuškevičė, Jolita Kruopienė
2020 Sustainability  
The data presented can aid decision-makers who need to choose a reuse model for a certain event.  ...  Three different models were applied and tested: A—only reusable cups, non-refundable model; B—only reusable cups, with deposit-refund; C—a mixed system of reusable cups with deposit-refund and of single-use  ...  Data Availability Statement: Data available in a publicly accessible repository. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/su13010247 fatcat:slocv6uocjgrlkyulfldsymemm

Visual analysis of faces with application in biometrics, forensics and health informatics [article]

Mohammad Ahsanul Haque
2016 Ph.d.-serien for Det Teknisk-Naturvidenskabelige Fakultet, Aalborg Universitet  
this purpose by using an improved heartbeat footprint tracking approach in the face.  ...  Both ECG and PCG heartbeat signals have al-ready been used as biometrics for human identity verification in the literature. A review of such important ECG-based approaches can be obtained from [9] .  ...  Biometrics provides a way of identifying a person using his/her physiological and/or behavioral features.  ... 
doi:10.5278/vbn.phd.engsci.00104 fatcat:445elv6ftfcw3lhg7svwqx3ifu

Learning Neural Textual Representations for Citation Recommendation

Binh Thanh Kieu, Inigo Jauregi Unanue, Son Bao Pham, Hieu Xuan Phan, Massimo Piccardi
2021 2020 25th International Conference on Pattern Recognition (ICPR)  
DAY 2 -Jan 13, 2021 Wan, Qian; Zou, Qin 1091 Learning Metric Features for Writer-Independent Signature Verification Using Dual Triplet Loss DAY 2 -Jan 13, 2021 Kieu, Thanh Binh; Jauregi Unanue  ...  Using First-Person-View Cameras Based on Sparse Optical Flows DAY 2 -Jan 13, 2021 Jia, Bin-Bin; Zhang, Min-Ling 35 MD-kNN: An Instance-Based Approach for Multi-Dimensional Classification DAY  ... 
doi:10.1109/icpr48806.2021.9412725 fatcat:3vge2tpd2zf7jcv5btcixnaikm

Collective Sensing: Integrating Geospatial Technologies to Understand Urban Systems—An Overview

Thomas Blaschke, Geoffrey J. Hay, Qihao Weng, Bernd Resch
2011 Remote Sensing  
Remote sensing technology provides a key data source for mapping such environments, but is not sufficient for fully understanding them.  ...  Castells [9] pursues another approach describing a city as "not a place, but a process". In this context, processes are considered the connections between centers in a global network.  ...  In particular, Reviewer B helped to shape the conclusions and we used some sentences from his/her own explanations in the last part of the paper.  ... 
doi:10.3390/rs3081743 fatcat:wjpmwwpwnnfypdgk5y6vd74dzy

International Research Conference on Smart Computing and Systems Engineering SCSE 2020 Proceedings [Full Conference Proceedings]

2020 2020 International Research Conference on Smart Computing and Systems Engineering (SCSE)  
ACKNOWLEDGMENT The authors would like to thank the Department of Census and Department of Irrigation, Sri Lanka for providing the paddy yield and climate data for this study.  ...  would like to extend their heartfelt gratitude and acknowledgment to all the language experts, Sinhala teachers from different schools and especially, the Sinhala Department in the University of Kelaniya for  ...  To identify the gender of a given third-person noun, the rule-based approach was used in this study.  ... 
doi:10.1109/scse49731.2020.9313027 fatcat:gjk5az2mprgvrpallwh6uhvlfi
« Previous Showing results 1 — 15 out of 188 results