The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work, we propose a deep learning approach for the detection of the activities of daily living (ADL) in a home environment starting from the skeleton data of an RGB-D camera. In this context, the combination of ad hoc features extraction/selection algorithms with supervised classification approaches has reached an excellent classification performance in the literature. Since the recurrent neural...
Color vision deficiency (CVD) is an extremely frequent vision impairment that compromises the ability to recognize colors. In order to improve color vision in a subject with CVD, we designed and developed a wearable improved vision system based on an augmented reality device. The system was validated in a clinical pilot study on 24 subjects with CVD (18 males and 6 females, aged 37.4 ± 14.2 years)...
This paper presents and discusses an Enterprise Rights Management System (ERM) tailored for remote maintenance facilities which features secure on-site documentation storage and availability, strong data provider control over access policy and their enforcement, minimal documentation disclosure and strong and ergonomic operator authentication by means of biometric measurements. The design approach...
Traditional cryptosystems are based on the possession of secret keys that can be stolen or shared by non legitimate users. On the other hand, binding the real identity of a system user to what he is instead of something he knows or possesses is the main desirable property of biometric systems. Biometric Crypto-Systems (or BCSs) are designed to bind a cryptographic key with a biometric template to...
We present an effective unsupervised segmentation method that is based only on the use of the direction map built in correspondence of the retinal image by assigning each pixel one out of twelve discrete directions. The segmentation method works on the green channel of RGB retina images and does not require any pre-processing phase. The method has been checked on the DRIVE dataset producing satisfactory...
In this paper we present a method to segment retinal vessels based on the use of the watershed transform and of the contrast map and the directional map built for the retina image. Pixels belonging to a single region of the watershed transform are assigned a unique gray-level and a unique direction. Each region of the watershed transform is also assigned a unique contrast value, computed as the maximum...
Many research studies demonstrated that recognition based on ear biometrics offers an accuracy which is comparable to face trait, especially in controlled settings. Our proposal is to exploit it to avoid the problem of newborn swap, which is possible and actually happens, most of all in crowded maternity wards of big hospitals. We tested the viability of this solution using a dataset of ear images...
The ability of a biometric system to reliably recognize registered individuals significantly depends on the kind and amount of variation that the exploited biometric trait may undergo throughout acquisitions. Those variations may be due both to acquisition devices, or to different environment settings, or to modification of the trait appearance. One of the strategies to address changes in biometric...
In this paper an iris detection scheme for noisy images acquired by means of mobile devices is presented. Iris segmentation is accomplished by exploiting the use of the watershed transform with the purpose of identifying the iris boundary as much precisely as possible. After a pre-processing step aimed at color/illumination correction, the watershed transform is computed and suitably binarized. Circle...
The use of mobile devices is continuously growing, together with their ability to store and exchange sensitive data. This has spurred the interest, from one side, in exploiting their apparent vulnerabilities, and on the other side, in protecting users from any malfeasance. In this scenario, it has become essential to develop and deploy secure access and identification protocols on mobile platforms...
Face recognition has made significant advances in the last decade, but robust commercial applications are still lacking. Current authentication/identification applications are limited to controlled settings, e.g., limited pose and illumination changes, with the user usually aware of being screened and collaborating in the process. Among others, pose and illumination changes are limited. To address...
Research community achieved considerable progress in face recognition over the past years. Despite this, present face recognition systems are not yet accurate or robust enough to be fully deployed in under-controlled yet high security environments. A number of works have investigated the impact of face categorization on recognition performance, in order to assess the hypothesis that a preliminary...
Face recognition provides many advantages compared with other available biometrics, but it is particularly subject to spoofing. The most accurate methods in literature addressing this problem, rely on the estimation of the three-dimensionality of faces, which heavily increase the whole cost of the system. This paper proposes an effective and efficient solution to problem of face spoofing. Starting...
In this work we present FOVEA, a system for video sequence indexing based on the identity of appearing subjects. We will detail the features of the single component modules, devoting special attention to classification and clustering. The system presents a number of peculiarities that distinguish it from existing ones. Among these, the account for the concomitant appearance of two subjects in the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.