Learning pairwise SVM on deep features for ear recognition

I Omara, X Wu, H Zhang, Y Du… - 2017 IEEE/ACIS 16th …, 2017 - ieeexplore.ieee.org
Recently, deep features extracted from Convolutional Neural Networks (CNNs) have been
widely adopted in various applications, such as face recognition. Compared with the …

Supporting privacy by design using privacy process patterns

V Diamantopoulou, C Kalloniatis, S Gritzalis… - ICT Systems Security …, 2017 - Springer
Abstract Advances in Information and Communication Technology (ICT) have had significant
impact on every-day life and have allowed us to share, store and manipulate information …

[HTML][HTML] 3D ear normalization and recognition based on local surface variation

Y Zhang, Z Mu, L Yuan, H Zeng, L Chen - Applied Sciences, 2017 - mdpi.com
Most existing ICP (Iterative Closet Point)-based 3D ear recognition approaches resort to the
coarse-to-fine ICP algorithms to match 3D ear models. With such an approach, the gallery …

Behavioral biometrics for smartphone user authentication

A Buriro - 2017 - eprints-phd.biblio.unitn.it
Pervasive in nature and extensively used for a wide range of features, smartphone provides
functionality such as social networking, online shopping, mobile gaming, private/group …

SMOTE-GPU: Big data preprocessing on commodity hardware for imbalanced classification

PD Gutiérrez, M Lastra, JM Benítez… - Progress in Artificial …, 2017 - Springer
Nowadays, it is usual to work with large amounts of data since our capacity of collecting and
storing information has increased significantly. The extraction of knowledge from these …

Fuzzy approaches and analysis in image processing

D Ezhilmaran, M Adhiyaman - Advanced image processing …, 2017 - igi-global.com
Fuzzy set theory originates to a great extent of interest among the researchers in past
decades. It is a key tool to handle the imperfect of information in the diverse field. Typically, it …

USTB-Helloear: A large database of ear images photographed under uncontrolled conditions

Y Zhang, Z Mu, L Yuan, C Yu, Q Liu - … , Revised Selected Papers, Part II 9, 2017 - Springer
The capabilities of biometric systems, such as face or fingerprint recognition systems, have
recently made extraordinary leaps by the emergence of deep learning. However, due to the …

Multimodal smartphone user authentication using touchstroke, phone-movement and face patterns

Z Akhtar, A Buriro, B Crispo… - 2017 IEEE global …, 2017 - ieeexplore.ieee.org
Recently, researches have shown to employ implicit behavioral biometrics via built-in
sensors (eg, gyroscope) for user identification on smartphones. The majority of prior studies …

A survey on cyber security evolution and threats: biometric authentication solutions

L Benarous, B Kadri, A Bouridane - … Opportunities & Challenges in The Big …, 2017 - Springer
Cybersecurity threats are serious, costly and challenging because they are various,
evolutive and easily spread. This chapter is dedicated to brief these issues, its evolution and …

Score-level fusion of two-dimensional and three-dimensional palmprint for personal recognition systems

M Chaa, NE Boukezzoula… - Journal of Electronic …, 2017 - spiedigitallibrary.org
Two types of scores extracted from two-dimensional (2-D) and three-dimensional (3-D)
palmprint for personal recognition systems are merged, introducing a local image descriptor …