Filters








19 Hits in 6.3 sec

Quality Assessment for Fingerprints Collected by Smartphone Cameras

Guoqiang Li, Bian Yang, Martin Aastrup Olsen, Christoph Busch
2013 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops  
We propose an approach to assess the quality of fingerprint samples captured by smartphone cameras under real-life scenarios. Our approach extracts a set of quality features for image blocks.  ...  A quality score is then generated for the whole sample.  ...  Conclusion and future work This paper proposes an effective fingerprint sample quality assessment approach for the samples captured by smartphone cameras using a set of block based quality features.  ... 
doi:10.1109/cvprw.2013.29 dblp:conf/cvpr/LiYOB13 fatcat:jhkdhpsrm5hgbg4advx2fnxr4y

A comprehensive survey of fingerprint presentation attack detection

Konstantinos Karampidis, Minas Rousouliotis, Euangelos Linardos, Ergina Kavallieratou
2021 Journal of Surveillance, Security and Safety  
Both hardware-and software-based state-of-the-art methods are thoroughly presented and analyzed for identifying real fingerprints from artificial ones to help researchers to design securer biometric systems  ...  In this review, we investigate fingerprint presentation attack detection by highlighting the recent advances in this field and addressing all the disadvantages of the utilization of fingerprints as a biometric  ...  TERMS, DEFINITIONS AND EVALUATION METRICS In this section, we report the terms and evaluation metrics utilized by authors in their publications.  ... 
doi:10.20517/jsss.2021.07 fatcat:arkgqtjmhfgqzgmwiuo4pc3squ

Evolution, Current Challenges, and Future Possibilities in ECG Biometrics

Joao Ribeiro Pinto, Jaime S. Cardoso, Andre Lourenco
2018 IEEE Access  
In the last years, the topic of ECG-based biometrics has quickly evolved toward the commercial applications, mainly by addressing the reduced acceptability and comfort by proposing new off-the-person,  ...  Commercial products using these traits for biometric identification or authentication are increasingly widespread, from smartphones to border control.  ...  In general, metric-based methods offer less accuracy than methods based on classifiers, but they gain some robustness by not having to be trained on a specific dataset, and thus do not depend much on the  ... 
doi:10.1109/access.2018.2849870 fatcat:jsnjs2cdqnbttn6hxtm2r6jkn4

A Comprehensive Survey on ECG signals as New Biometric Modality for Human Authentication: Recent Advances and Future Challenges

Anthony Ngozichukwuka Uwaechia, Dzati Athiar Ramli
2021 IEEE Access  
While the generators generate samples with approximate real data distribution via random data, the discriminators require to discriminate between true samples and false samples [355] .  ...  The authors in [33] employed the autocorrelation features with a non-overlapping window to build features, while the approach in [30] applied the autocorrelation/discrete cosine transform (DCT) feature  ... 
doi:10.1109/access.2021.3095248 fatcat:6bdgelhmanb27ii25e25wkewey

A New Frontier for IoT Security Emerging From Three Decades of Key Generation Relying on Wireless Channels

Junqing Zhang, Guyue Li, Alan Marshall, Aiqun Hu, Lajos Hanzo
2020 IEEE Access  
ACKNOWLEDGEMENTS We would like to thank Mr Yan Wang for his hard work implementing the key generation demonstration system during his final year project.  ...  EVALUATION METRIC There are a number of metrics in the key generation area for evaluating the quality of the keys generated. 1) Cross-Correlation The signal similarity can be quantified by the crosscorrelation  ...  The metrics evaluate both the quality of analog measurements (crosscorrelation and ACF, SKR) and the performance metrics such as the KDR, KGR and randomness. IV.  ... 
doi:10.1109/access.2020.3012006 fatcat:yqlhgsxfjvdwvfo2jcvxxzhj2i

Privacy-Protecting Techniques for Behavioral Data: A Survey [article]

Simon Hanisch, Patricia Arias-Cabarcos, Javier Parra-Arnau, Thorsten Strufe
2021 arXiv   pre-print
We taxonomize and compare existing solutions regarding privacy goals, conceptual operation, advantages, and limitations.  ...  Our behavior (the way we talk, walk, or think) is unique and can be used as a biometric trait. It also correlates with sensitive attributes like emotions.  ...  In a first phase, the authors propose computing the discrete cosine transform (DCT) of the ECG signal's autocorrelation coefficients, and then removing those DCT coefficients with the lowest energy.  ... 
arXiv:2109.04120v1 fatcat:zsv2bgrynveutlq2akx3vllhbq

On the Instability of Sensor Orientation in Gait Verification on Mobile Phone

Thang Hoang, Deokjai Choi, Thuc Nguyen
2015 Proceedings of the 12th International Conference on Security and Cryptography  
While the gait signal captured by inertial sensors is understood to be a reliable profile for effective implicit authentication, recent studies have been conducted in ideal conditions and might therefore  ...  By adopting PCA+SVM to construct the gait model, the proposed method outperformed other state-of-the-art studies, with an equal error rate of 2.45\% and accuracy rate of 99.14\% in terms of the verification  ...  ACKNOWLEDGEMENTS The research was also supported by 2012-18-02TD VNU-HCMC Project.  ... 
doi:10.5220/0005572001480159 dblp:conf/secrypt/HoangCN15 fatcat:mkdtnlcwwfdtxkgdwai3mvneem

Welcome Messages

2019 2019 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)  
Abstract-Halftone based block truncation coding images (H-BTC) are the improved version of BTC images which can offer superior representation and enhanced image quality.  ...  In addition to the user fairness, we make the spatial streams which convey visually more important information be high-quality for achieving high video quality.  ...  In this paper, a channel selection metric based on SNR and the number of users has been presented for WLAN. It is based on SNR and the number of users. we define a polynomial metric.  ... 
doi:10.1109/ispacs48206.2019.8986291 fatcat:gu4zaxsqkncp5n2ebj5fybk7ce

Visual analysis of faces with application in biometrics, forensics and health informatics [article]

Mohammad Ahsanul Haque
2016 Ph.d.-serien for Det Teknisk-Naturvidenskabelige Fakultet, Aalborg Universitet  
and then the coefficients of the Discrete Cosine Transform (DCT) of the autocorrelation of these segments have been obtained for the identification.  [35] a ZivMerhav cross parsing method based on  ...  by measuring face quality metrics (Mohammad, 2013) .  ...  For example, fingerprint and hand-written signature can be forged to breach the identification system [2] , voice can be altered or imitated, and still picture based traits can be used in absence of the  ... 
doi:10.5278/vbn.phd.engsci.00104 fatcat:445elv6ftfcw3lhg7svwqx3ifu

Introduction [chapter]

2016 Music Data Analysis  
This series aims to foster the integration between the computer sciences and statistical, numerical, and probabilistic methods by publishing a broad range of reference works, textbooks, and handbooks.  ...  The interface between the computer and statistical sciences is increasing, as each discipline seeks to harness the power and resources of the other.  ...  Therefore, autocorrelation functions of different intervals are analyzed and ranked by defining the so-called generalized coincidence function.  ... 
doi:10.1201/9781315370996-5 fatcat:avooqogcpnbjngqmzuonil3exq

Ancestral imprints: histories of Irish traditional music and dance

2013 ChoiceReviews  
This thesis was prepared according to the regulations for postgraduate study by research of the Dublin Institute of Technology and has not been submitted in whole or in part for an award in any other Institute  ...  i Declaration I certify that this thesis which I now submit for examination for the award of Doctor of Philosophy, is entirely my own work and has not been taken from the work of others save and to the  ...  Table 35 shows a sample of the data collected in this experiment for the audio file used to generate Figure 47 and Figure 48 . The full table is given in Appendix G.  ... 
doi:10.5860/choice.50-3164 fatcat:t2cc4biirnbkhitfv2caxu6zeq

Implementation of Fog computing for reliable E-health applications

Razvan Craciunescu, Albena Mihovska, Mihail Mihaylov, Sofoklis Kyriazakos, Ramjee Prasad, Simona Halunga
2015 2015 49th Asilomar Conference on Signals, Systems and Computers  
He received the B.A.Sc. degree (with honors) from the University of British Columbia, Vancouver, BC, Canada, in 1985 and the M.A.Sc. and Ph.D. degrees from The 5th generation (5G) wireless communication  ...  In this work we explore some of the potential fiber-optic data transmission applications of the nonlinear Fourier transform (NFT), a signal analysis technique introduced by mathematicians and physicists  ...  In this paper we have proposed to use DCT-based features in parallel with wavelet-based ones for palmprint identification.  ... 
doi:10.1109/acssc.2015.7421170 dblp:conf/acssc/CraciunescuMMKP15 fatcat:qm6mki5z6bcvrfimkmqjyrxaxm

An application layer non-repudiation wireless system: A cross-layer approach

Sasan Adibi
2010 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)  
This thesis considers this issue in a wireless medium and studies the Quality of Service (QoS)/Security requirements in terms of network parameters and performance metrics.  ...  ) for encryption and authentication, the Elliptic Curve Digital Signature Algorithm (ECDSA) for digital signatures, and the Secure Hash Algorithm (SHA) for integrity.  ...  The results could be used to provide general guidelines for the deployments of such devices.mLearning and mHealth on 3G networks: Following the same future direction for deploying wireless handhelds, Smartphones  ... 
doi:10.1109/wowmom.2010.5534971 dblp:conf/wowmom/Adibi10 fatcat:tzhws7t5tzao7eh7qcxfn5srfy

Ping-pong beam training for reciprocal channels with delay spread

Elisabeth de Carvalho, Jorgen Bach Andersen
2015 2015 49th Asilomar Conference on Signals, Systems and Computers  
The idea is based on estimating the norm of available samples at nodes.  ...  We introduce a generalized scale mixture framework, and provide connections with well known norm minimization based SSR algorithms.  ...  In this paper we have proposed to use DCT-based features in parallel with wavelet-based ones for palmprint identification.  ... 
doi:10.1109/acssc.2015.7421451 dblp:conf/acssc/CarvalhoA15 fatcat:mqokuvnh3zg45licnfbgxyvxfu

PATTERNS Publicity Chairs PATTERNS Publicity Chairs PATTERNS 2015 Technical Program Committee

Fritz Laux, Fritz Laux, Michal Zemlicka, Alfred Zimmermann, Richard Laing, Ricardo Sanz, Upm Aslab, Mauricio Spain, Hess-Flores, Nguyen Hoàng, France Mirnig, Bastian Roth (+102 others)
unpublished
We also gratefully thank the members of the PATTERNS 2015 organizing committee for their help in handling the logistics and for their work that made this professional meeting a success.  ...  We hope PATTERNS 2015 was a successful international forum for the exchange of ideas and results between academia and industry and to promote further progress in the area of pervasive patterns and applications  ...  their generous help in the implementation of the framework, and to thank Arun Lakhotia and Vivek Notani for their support and willing to provide the VirusBattle SDK platform.  ... 
fatcat:lejh6vqedjedpknlbtyznfvoli
« Previous Showing results 1 — 15 out of 19 results