The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Steganography is the art of covered writing or hidden writing. The main concern of steganography (image hiding) methods is to embed a secret image into a cover image in such a way that the cover should remain as similar as possible to its original version. In addition the cover image should remain robust with respect to usual attacks. In this research, we present a method that tries to cover all above...
Dissimilarities in equal error rates (EERs) of multiple matchers heavily influence the performance of multi-biometric systems. A normalization technique aims at improving the recognition rate of such a system. In view of this, in this paper, an anchored normalization technique, referred to as improved anchored min-max (IAMM) technique for a multimodal biometric system, is developed. In the proposed...
In the field of automatic face recognition, transformations of facial features due to aging cause a problem. Due to small amounts of extracted features, the identity verification can be difficult. The feature-based methods that are present in the literature are still being developed, with unsatisfactory results caused by high rates of false matching. In this paper we present a new method of matching...
This paper presents a person identification technique that uses information from person's shadow, and is robust to appearance changes caused by variations of clothes and carried objects. The technique uses invisible lights and resulting shadows and has advantages from undetected sensing. The shadows on the ground obtained through illumination by multiple lights can be considered as silhouettes captured...
In this paper, we propose a novel robust and efficient minutia-based fingerprint matching algorithm. There are two key contributions. First, we apply a set of global level minutia dependent features, i.e., the qualities that measure the reliabilities of the extracted minutiae and the area of overlapping regions between the query and template images of fingerprints. The implementation of these easy-to-get...
We review some recent techniques for 3D tracking and occlusion handling for computer vision-based augmented reality. We discuss what their limits for real applications are, and why object recognition techniques are certainly the key to further improvements.
This paper presents an approach to generate secure minutiae information in fingerprint templates. Using triplets of minutia points, useful geometrical properties can be derived from minutia triplets to hide their coordinates, direction of minutia, and scale. This non-invertible transform enables matching from the results in the anonymous domain to fight against malicious attacks to biometrics. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.