P Drozdowski, C Rathgeb, A Dantcheva… - … on Technology and …, 2020 - ieeexplore.ieee.org
Systems incorporating biometric technologies have become ubiquitous in personal, commercial, and governmental identity management applications. Both cooperative (eg …
The proliferation of user-generated content on social media has made opinion mining an arduous job. As a microblogging platform, Twitter is being used to collect views about …
Online handwritten analysis presents many applications in e-security, signature biometrics being the most popular but not the only one. Handwriting analysis also has an important set …
P Drozdowski, C Rathgeb, C Busch - IET Biometrics, 2019 - Wiley Online Library
The computational workload is one of the key challenges in biometric identification systems. The naïve retrieval method based on an exhaustive search becomes impractical with the …
K Zhang, W Luo, L Ma, W Liu… - Proceedings of the IEEE …, 2019 - openaccess.thecvf.com
Gait recognition is an important biometric method popularly used in video surveillance, where the task is to identify people at a distance by their walking patterns from video …
Facial recognition technology (FRT) has been widely studied and criticized for its racialising impacts and its role in the overpolicing of minoritised communities. However, a key aspect of …
Abstract Background Intensive Care Unit (ICU) readmissions in patients with heart failure (HF) result in a significant risk of death and financial burden for patients and healthcare …
The discriminative ability of geometric features can be well supported by empirical studies in ear recognition. Recently, a number of methods have been suggested for geometric feature …
In this paper, an approach that makes use of knuckle creases and fingernails for person identification is presented. It introduces a framework for automatic person identification that …