The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The AMIDST Toolbox an open source Java 8 library for scalable learning of probabilistic graphical models (PGMs) based on both batch and streaming data. An important application domain with streaming data characteristics is the banking sector, where we may want to monitor individual customers (based on their financial situation and behavior) as well as the general economic climate. Using a real financial...
Automatic behavior analysis from video is a major topic in many areas of research, including computer vision, multimedia, robotics, biology, cognitive science, social psychology, psychiatry, and linguistics. Two major problems are of interest when analyzing behavior. First, we wish to automatically categorize observed behaviors into a discrete set of classes (i.e., classification). For example, to...
This paper presents a real-time video event recognition system for controlled environments. It is able to recognize human activities and interactions with the objects of the environment by exploiting different cues like trajectory analysis, skin detection and people recognition of the foreground blobs of the scene. Time variations of these features are studied and combined using Bayesian inference...
In Islamic religion, mistakes in recitation of holy Quran (the sacred book of Muslims) are forbidden. Mistakes can be missing words, verse, misreading Harakat (pronunciations, punctuations, and accents). Thus, a hafiz/reciter who memorizes the holy Quran, needs other hafiz/tutor who listens the recitation and points oral mistakes. Due to the seriously commitment, the availability and expertise of...
This paper evaluates the combination of static image (off-line) and dynamic information (on-line) for signature verification. Two off-line and two on-line recognition approaches exploiting information at the global and local levels are used. Experimental results are given using the BiosecurID database (130 signers, 3,640 signatures). Fusion experiments are done using a trained fusion approach based...
A novel scheme to generate multiple synthetic samples from a real on-line handwritten signature is proposed. The algorithm models a transmission channel which introduces a certain distortion into the real signature to produce the different synthetic samples. The method is used to increase the amount of data of the clients enrolling on a state-of-the-art HMM-based signature verification system. The...
A brute force attack using synthetically generated handwritten signatures is performed against a HMM-based signature recognition system. The generation algorithm of synthetic signatures is based on the spectral analysis of the trajectory functions and has proven to produce very realistic results. The experiments are carried out by attacking real signature models from the MCYT database (which comprises...
The proliferation of handheld devices such as PDAs and smart phones represents a new scenario for automatic signature verification. Traditionally, research on signature verification has been carried out employing signatures acquired using digitizing tablets or Tablet-PCs. In this paper we study the effects of the mobile acquisition conditions and we analyze the considerations that must be taken in...
The security of biometric data is a very important issue in the deployment of biometric-based recognition systems. In this paper, we propose a signature-based biometric authentication system, where signal processing techniques are applied to the acquired on-line signature in order to generate protected templates, from which retrieving the original data is computationally as hard as randomly guessing...
In this work, resampling techniques and interpolation are applied to on-line signatures. Their effect on the performance of an on-line signature system using hidden Markov models is studied. The presented techniques are based on linear interpolation and Catmull-Rom cubic splines. Experimental results are provided on the MCYT database comprising 16,500 signatures from 330 subjects and as many skilled...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.