The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Sclera recognition has provoked research interest recently due to the distinctive properties of its blood vessels. However, segmenting noisy sclera areas in eye images under relaxed imaging constraints, such as different gaze directions, capturing on-the-move and at-a-distance, has not been extensively investigated. In our previous work, we proposed a novel method for sclera segmentation under unconstrained...
Having a secure information system depends on successful authentication of legitimate users so as to prevent attacks from fraudulent persons. Traditional information security systems use a password or personal identification number (PIN). This means they can be easily accessed by unauthorized persons without access being noticed. This paper addresses the issue of enhancing such systems using keystroke...
A comprehensive survey on patch recognition, which is a crucial part of content-based image retrieval (CBIR), is presented. CBIR can be viewed as a methodology in which three correlated modules including patch sampling, characterizing, and recognizing are employed. This paper aims to evaluate meaningful models for one of the most challenging problems in image understanding, specifically, for the effective...
The use of computer has increased rapidly as well as the use of internet applications such as e-commerce, online banking services, webmail, and blogs. All internet applications require a password authentication scheme to make sure only the genuine individual can login to the application. Passwords and personal identification numbers (PIN) have traditionally been used to access such applications [1,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.