Personal identification using multibiometrics rank-level fusion

A Kumar, S Shekhar - IEEE Transactions on Systems, Man, and …, 2010 - ieeexplore.ieee.org
This paper investigates a new approach for the personal recognition using rank-level
combination of multiple biometrics representations. There has been very little effort to study …

Cancelable templates for sequence-based biometrics with application to on-line signature recognition

E Maiorana, P Campisi, J Fierrez… - … on Systems, Man …, 2010 - ieeexplore.ieee.org
Recent years have seen the rapid spread of biometric technologies for automatic people
recognition. However, security and privacy issues still represent the main obstacles for the …

[PDF][PDF] Discriminant analysis for dimensionality reduction: An overview of recent developments

J Ye, S Ji - Biometrics: Theory, Methods, and Applications. Wiley …, 2010 - Citeseer
Many biometric applications such as face recognition involve data with a large number of
features [1–3]. Analysis of such data is challenging due to the curse-ofdimensionality [4, 5] …

Multifeature-based high-resolution palmprint recognition

J Dai, J Zhou - IEEE Transactions on Pattern Analysis and …, 2010 - ieeexplore.ieee.org
Palmprint is a promising biometric feature for use in access control and forensic
applications. Previous research on palmprint recognition mainly concentrates on low …

A hybrid biometric cryptosystem for securing fingerprint minutiae templates

A Nagar, K Nandakumar, AK Jain - Pattern recognition letters, 2010 - Elsevier
Security concerns regarding the stored biometric data is impeding the widespread public
acceptance of biometric technology. Though a number of bio-crypto algorithms have been …

A frequency-based approach for features fusion in fingerprint and iris multimodal biometric identification systems

V Conti, C Militello, F Sorbello… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
The basic aim of a biometric identification system is to discriminate automatically between
subjects in a reliable and dependable way, according to a specific-target application …

On the vulnerability of face verification systems to hill-climbing attacks

J Galbally, C McCool, J Fierrez, S Marcel… - Pattern Recognition, 2010 - Elsevier
In this paper, we use a hill-climbing attack algorithm based on Bayesian adaption to test the
vulnerability of two face recognition systems to indirect attacks. The attacking technique uses …

Face recognition by computers and humans

R Chellappa, P Sinha, PJ Phillips - Computer, 2010 - ieeexplore.ieee.org
This article talks about how the study of how humans perceive faces can be used to help
design practical systems for face recognition. Besides applications related to identification …

Adaptive fingerprint pore modeling and extraction

Q Zhao, D Zhang, L Zhang, N Luo - Pattern Recognition, 2010 - Elsevier
Sweat pores on fingerprints have proven to be discriminative features and have recently
been successfully employed in automatic fingerprint recognition systems (AFRS), where the …

Robust ECG biometrics by fusing temporal and cepstral information

M Li, S Narayanan - 2010 20th International Conference on …, 2010 - ieeexplore.ieee.org
The use of vital signs as a biometric is a potentially viable approach in a variety of
application scenarios such as security and personalized health care. In this paper, a novel …