Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper we investigate the question of combining multi-sample matching results obtained during repeated attempts of fingerprint based authentication. In order to utilize the information corresponding to multiple input templates in a most efficient way, we propose a minutiae-based matching state model which uses relationship between test templates and enrolled template. The principle of this...
Besides the recognition task, today's biometric systems need to cope with additional problem: spoofing attacks. Up to date, academic research considers spoofing as a binary classification problem: systems are trained to discriminate between real accesses and attacks. However, spoofing counter-measures are not designated to operate stand-alone, but as a part of a recognition system they will protect...
For a robust face biometric system, a reliable anti-spoofing approach must be deployed to circumvent the print and replay attacks. Several techniques have been proposed to counter face spoofing, however a robust solution that is computationally efficient is still unavailable. This paper presents a new approach for spoofing detection in face videos using motion magnification. Eulerian motion magnification...
Photographs, videos or masks can be used to spoof face recognition systems. In this paper, a countermeasure is proposed to protect face recognition systems against 3D mask attacks. The reason for the lack of studies on countermeasures against mask attacks is mainly due to the unavailability of public databases dedicated to mask attack. In this study, a 2D+3D mask attacks database is used that is prepared...
In challenging image acquisition settings where the performance of iris recognition algorithms degrades due to poor segmentation of the iris, image blur, specular reflections, and occlusions from eye lids and eye lashes, the periocular region has been shown to offer better recognition rates. However, the definition of a periocular region is subject to interpretation. This paper investigates the question...
n this paper, we explore the effectiveness of patch-based gradient feature extraction methods when applied to appearance-based gait recognition. Extending existing popular feature extraction methods such as HOG and LDP, we propose a novel technique which we term the Histogram of Weighted Local Directions (HWLD). These 3 methods are applied to gait recognition using the GEI feature, with classification...
Since several years, there is a high interest in the creation of template update mechanisms in biometrics. By automatically updating over time the biometric reference of an individual, these update systems aim at avoiding a performance decreases over time. However, update errors occur when impostor samples are included in the biometric reference. In this paper, we are interested in analysing the behavior...
Fingerprint quality assessment is a crucial task which needs to be conducted accurately in various phases in the biometric enrolment and recognition processes. Neglecting quality measurement will adversely impact accuracy and efficiency of biometric recognition systems (e.g. verification and identification of individuals). Measuring and reporting quality allows processing enhancements to increase...
We propose an approach to assess the quality of fingerprint samples captured by smartphone cameras under real-life scenarios. Our approach extracts a set of quality features for image blocks. Without needing segmentation, the approach determines a sample's quality by checking all image blocks divided from the sample and for each block a trained support vector machine gives a binary indication - "high-quality"...
The development of biometric recognition technologies often requires large sets of biometric data for training and evaluation purposes. The use of synthetically generated biometric samples has been explored as a means of avoiding the challenges of large scale data collection. Our paper builds on previous work in synthetic fingerprint generation research through the modeling and synthesis of texture...
Image-set-based face recognition has recently attracted much attention due to widespread of surveillance and video retrieval applications. Extraction of partial and misaligned face images from a video is relatively common in unconstrained scenarios and in the presence of detection/localization error, respectively. However, existing face recognition techniques that consider holistic image-set representation...
Recently, the regularized coding-based classification method (e.g. SRC and CRC) shows a great potential for face recognition. However, most existing coding methods ignore the statistical information from the training data, which actually plays an important role in classification. To address this problem, we develop a general regression and representation model (GRR) for classification. GRR not only...
The phenomenon of "aging" in humans leads to significant variations in facial features. Various factors such as bone growth, ethnicity and dietary habits influence the facial aging pattern. This increases the difficulty in performing automated face recognition. In this paper, we propose an algorithm that improves the performance of face recognition by applying the bacteria foraging fusion...
In the field of biometric recognition, similarity measure using local features such as Gabor-based coding, Local Binary Patterns (LBP) and Scale Invariant Feature Transform (SIFT) has been applied to various biometric recognition problems. These features, however, may not always exhibit higher recognition performance than the recognition algorithms of the specific biometric trait. In this paper, we...
With the prevalent utilization of citizen databases, an individual has to prove his/her identity for accessing several services such as banking, health care, and social welfare benefits. These databases are now increasingly using demographic and biometric information to uniquely identify the individuals. It protects the core identity of citizens and facilitates them to receive the entitled benefits...
An important problem in multi-stage biometric verification is to select an appropriate reject region. A reject region says which samples to be rejected. Rejecting impostor samples does not incur any cost in terms of user inconvenience, however, erroneously rejecting genuine samples leads to both user and administrator inconvenience. The problem becomes severe in the applications that involve a huge...
Symmetry is a pervasive phenomenon presenting itself in all forms and scales in natural and manmade environments. Its detection plays an essential role at all levels of human as well as machine perception. The recent resurging interest in computational symmetry for computer vision and computer graphics applications has motivated us to conduct a US NSF funded symmetry detection algorithm competition...
While most approaches to symmetry detection in machine vision try to explain the gray-values or colors of the pixels, Gestalt algebra has no room for such measurement data. The entities (i.e. Gestalten) are only defined with respect to each other. They form a generic hierarchy, and live in a continuous domain without any pixel raster. There is also no constraint forcing them to completely fill an...
We propose a novel approach for detecting partial reflectional symmetry in images. Our method consists of two principal stages: candidate selection and validation. In the first step, candidates for mirror-symmetric patches are identified using an existing heuristic procedure based on Hough voting. The candidates are then validated using a principled statistical procedure inspired from the a contrario...
Symmetry is a crucial dimension which aids the visual system, human as well as artificial, to organize its environment and to recognize forms and objects. In humans, detection of symmetry, especially bilateral and rotational, is considered to be a primary factor for discovering and interacting with the surrounding environment. We report an enhanced version of the Kondra and Petrosino symmetry detection...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.