Robust biometric score fusion by naive likelihood ratio via receiver operating characteristics

Q Tao, R Veldhuis - IEEE transactions on information forensics …, 2012 - ieeexplore.ieee.org
This paper presents a novel method of fusing multiple biometrics on the matching score
level. We estimate the likelihood ratios of the fused biometric scores, via individual receiver …

An efficient technique for ear detection in 3D: Invariant to rotation and scale

S Prakash, P Gupta - 2012 5th IAPR International Conference …, 2012 - ieeexplore.ieee.org
This paper proposes an efficient technique to detect ear from 3D profile face range images
and is invariant to rotation and scale. It makes use of graph connected components …

Hand-based multimodal identification system with secure biometric template storage

MB Ramalho, PL Correia, LD Soares - IET computer vision, 2012 - IET
This study proposes a biometric system for personal identification based on three biometric
characteristics from the hand, namely: the palmprint, finger surfaces and hand geometry. A …

Eye blink based detection of liveness in biometric authentication systems using conditional random fields

M Szwoch, P Pieniążek - … Conference on Computer Vision and Graphics, 2012 - Springer
The goal of this paper was to verify whether the conditional random fields are suitable and
enough efficient for eye blink detection in user authentication systems based on face …

Evaluation of machine learning techniques for face detection and recognition

EG Amaro, MA Nuño-Maganda… - CONIELECOMP …, 2012 - ieeexplore.ieee.org
Biometric identification (BI) is one of the most explored topics in recent years. One of the
most important techniques for BI is face recognition. Face recognition systems (FRSs) are an …

Multimodal biometric person authentication using fingerprint, face features

TB Long, LH Thai, T Hanh - PRICAI 2012: Trends in Artificial Intelligence …, 2012 - Springer
In this paper, the authors present a multimodal biometric system using face and fingerprint
features with the incorporation of Zernike Moment (ZM) and Radial Basis Function (RBF) …

Multi-modal and multi-instance fusion for biometric cryptosystems

J Merkle, T Kevenaar, U Korte - 2012 BIOSIG-Proceedings of …, 2012 - ieeexplore.ieee.org
Biometric cryptosystems allow cryptographic privacy protection for biometric reference data
without storing a secret key. However, their security is inherently limited by the discriminative …

Implementation of hand vein structure authentication based system

MM Pal, RW Jasutkar - 2012 International Conference on …, 2012 - ieeexplore.ieee.org
Biometric authentication provides a high security and reliable approach to be used in
security access system. However, this authentication method has not been widely …

Learning for meta-recognition

WJ Scheirer, A de Rezende Rocha… - IEEE Transactions …, 2012 - ieeexplore.ieee.org
In this paper, we consider meta-recognition, an approach for postrecognition score analysis,
whereby a prediction of matching accuracy is made from an examination of the tail of the …

Fingerprint based license checking for auto-mobiles

JA Rubella, M Suganya, K Senathipathi… - 2012 Fourth …, 2012 - ieeexplore.ieee.org
Driving license system is a very difficult task for the government to monitor. In this project, all
the citizens' images will scan and recorded. Whenever a citizen crosses the traffic rules, the …