Can a “poor” verification system be a “good” identification system? A preliminary study

B DeCann, A Ross - 2012 IEEE International Workshop on …, 2012 - ieeexplore.ieee.org
The matching accuracy of a biometric system is typically quantified through measures such
as the False Match Rate (FMR), False Non-match Rate (FNMR), Equal Error Rate (EER) …

On designing a SWIR multi-wavelength facial-based acquisition system

T Bourlai, N Narang, B Cukic… - Infrared technology and …, 2012 - spiedigitallibrary.org
In harsh environmental conditions characterized by unfavorable lighting and pronounced
shadows, human recognition based on Short-Wave Infrared (0.9-1.7 microns) images may …

[PDF][PDF] Fusion of ear and soft-biometrics for recognition of newborn

S Tiwari, A Singh, SK Singh - Signal and Image Processing: An …, 2012 - academia.edu
Recognition of newborn after birth is a critical issue for hospitals, maternity word and other
places where multiple birthstake place. Switching and abduction of newborn is a global …

Automatic speaker recognition for forensic case assessment and interpretation

A Drygajlo - Forensic Speaker Recognition: Law Enforcement and …, 2012 - Springer
Forensic speaker recognition (FSR) is the process of determining if a specific individual
(suspected speaker) is the source of a questioned voice recording (trace). The forensic …

Integrating iris and signature traits for personal authentication using user-specific weighting

S Viriri, JR Tapamo - Sensors, 2012 - mdpi.com
Biometric systems based on uni-modal traits are characterized by noisy sensor data,
restricted degrees of freedom, non-universality and are susceptible to spoof attacks. Multi …

Low complexity iris recognition using curvelet transform

A Ahamed, MIH Bhuiyan - 2012 International Conference on …, 2012 - ieeexplore.ieee.org
In this paper, a low complexity technique is proposed for iris recognition in the curvelet
transform domain. The proposed method does not require the detection of outer boundary …

Evaluation of multimodal biometric score fusion rules under spoof attacks

Z Akhtar, G Fumera, GL Marcialis… - 2012 5th IAPR …, 2012 - ieeexplore.ieee.org
Recent works have shown that multimodal biometric systems can be evaded by spoofing
only a single biometric trait. In this paper, we propose a method to evaluate the robustness …

[PDF][PDF] Image fusion using PCA in multifeature based palmprint recognition

J Nirosha Joshitha, RM Selin - … Journal of Soft Computing and Engineering, 2012 - Citeseer
Biometric technology offers an effective approach to identify personal identity by using
individual's unique, reliable and stable physical or behavioral characteristics. Palmprint is a …

Trajectory analysis for user verification and recognition

HK Pao, J Fadlil, HY Lin, KT Chen - Knowledge-Based Systems, 2012 - Elsevier
For many computer activities, user verification is necessary before the system will authorize
access. The objective of verification is to separate genuine account owners from intruders or …

Weight estimation from frame sequences using computational intelligence techniques

RD Labati, A Genovese, V Piuri… - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
Soft biometric techniques can perform a fast and unobtrusive identification within a limited
number of users, be used as a preliminary screening filter, or combined in order to increase …