You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Cross disciplinary biometric systems help boost the performance of the conventional systems. Not only is the recognition accuracy significantly improved, but also the robustness of the systems is greatly enhanced in the challenging environments, such as varying illumination conditions. By leveraging the cross disciplinary technologies, face recognition systems, fingerprint recognition systems, iris recognition systems, as well as image search systems all benefit in terms of recognition performance. Take face recognition for an example, which is not only the most natural way human beings recognize the identity of each other, but also the least privacy-intrusive means because people show their...
This book constitutes the refereed proceedings of the International Workshop on Multimedia Content Representation, Classification and Security, MRCS 2006. The book presents 100 revised papers together with 4 invited lectures. Coverage includes biometric recognition, multimedia content security, steganography, watermarking, authentication, classification for biometric recognition, digital watermarking, content analysis and representation, 3D object retrieval and classification, representation, analysis and retrieval in cultural heritage, content representation, indexing and retrieval, and more.
Biometrics is a rapidly evolving field with applications ranging from accessing one’s computer to gaining entry into a country. The deployment of large-scale biometric systems in both commercial and government applications has increased public awareness of this technology. Recent years have seen significant growth in biometric research resulting in the development of innovative sensors, new algorithms, enhanced test methodologies and novel applications. This book addresses this void by inviting some of the prominent researchers in Biometrics to contribute chapters describing the fundamentals as well as the latest innovations in their respective areas of expertise.
This book constitutes the refereed proceedings of the International Conference on Biometrics, ICB 2006, held in Hong Kong, China in January 2006. The book includes 104 revised full papers covering such areas of biometrics as the face, fingerprint, iris, speech and signature, biometric fusion and performance evaluation, gait, keystrokes, and more. In addition the results of the Face Authentication Competition (FAC 2006) are also announced in this volume.
This book constitutes the refereed proceedings of the 5th International Conference on Audio- and Video-Based Biometric Person Authentication, AVBPA 2005, held in Hilton Rye Town, NY, USA, in July 2005. The 66 revised oral papers and 50 revised poster papers presented were carefully reviewed and selected from numerous submissions. The papers discuss all aspects of biometrics including iris, fingerprint, face, palm print, gait, gesture, speaker, and signature; theoretical and algorithmic issues are dealt with as well as systems issues. The industrial side of biometrics is evident from presentations on smart cards, wireless devices, and architectural and implementation aspects.
This book presents novel graph-theoretic methods for complex computer vision and pattern recognition tasks. It presents the application of graph theory to low-level processing of digital images, presents graph-theoretic learning algorithms for high-level computer vision and pattern recognition applications, and provides detailed descriptions of several applications of graph-based methods to real-world pattern recognition tasks.
Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their credentials. Many users may not be able to determine whether their device is trustworthy, i.e. it might contain malware. One solution is to use visual cryptography for authentication. The author generalizes this concept to human decipherable encryption schemes and establishes a relationship to CAPTCHAS. He proposes a new security model and presents the first visual encryption scheme which makes use of noise to complicate the adversary's task. To prevent service providers from keeping their users under surveillance, anonymous credentials may be used. However, sometimes it is desirable to prevent the users from sharing their credentials. The author compares existing approaches based on non-transferable anonymous credentials and proposes an approach which combines biometrics and smartcards.
Automatic Fingerprint authentication for personal identification and verification has received considerable attention over the past decades among various biometric techniques because of the distinctiveness and persistence properties of fingerprints. Now fingerprints are set to explode in popularity as they are being used to secure smart phones and to authorize payments in online stores. The main objective of this paper is to review the extensive research work that has been done over the past decade and discuss the various approaches proposed for fingerprint matching.
'Context' is defined as ‘any information that can be used to characterize the situation of an entity’. Nowadays, the increasing availability of communication networks, the miniaturization and progressive reduction in the cost of sensors and the penetration of advanced mobile personal devices make possible to collect and process data from multiple sources and combine them in order to automatically infer knowledge about the user’s situation. Thus, the CONTEXTS Workshop aims at gathering advances on key elements that enable the design and deployment of personalized ubiquitous context-aware services and natural non-intrusive methods for interaction. The Workshop is organized and funded by the CONTEXTS Programme, one of the largest cooperative research initiatives in Madrid, with the participation of institutions from all over Spain and with the support of international experts. The CONTEXTS Programme focuses on advancing the key elements in frontier communications and location technologies, data processing and multisensor fusion and paradigms for intelligent/adaptative management, which make feasible the development of advanced personalized applications for ambient intelligence.
This comprehensive handbook addresses the sophisticated forensic threats and challenges that have arisen in the modern digital age, and reviews the new computing solutions that have been proposed to tackle them. These include identity-related scenarios which cannot be solved with traditional approaches, such as attacks on security systems and the identification of abnormal/dangerous behaviors from remote cameras. Features: provides an in-depth analysis of the state of the art, together with a broad review of the available technologies and their potential applications; discusses potential future developments in the adoption of advanced technologies for the automated or semi-automated analysis of forensic traces; presents a particular focus on the acquisition and processing of data from real-world forensic cases; offers an holistic perspective, integrating work from different research institutions and combining viewpoints from both biometric technologies and forensic science.