Advances in the field of Information Technology also make Information Security an inseparable part of it. In order to deal with security, Authentication plays an important role …
S Kanev, JP Darago, K Hazelwood… - Proceedings of the …, 2015 - dl.acm.org
With the increasing prevalence of warehouse-scale (WSC) and cloud computing, understanding the interactions of server applications with the underlying microarchitecture …
Biometric recognition, or simply biometrics, refers to the use of distinctive anatomical and/or behavioral characteristics or identifiers (eg, fingerprints, face, iris, voice, and hand geometry) …
J Daugman - The essential guide to image processing, 2009 - Elsevier
Publisher Summary This chapter explains the iris recognition algorithms and presents results of 9.1 million comparisons among eye images from trials in Britain, the USA, Japan …
The detection and recognition of objects in images is a key research topic in the computer vision community. Within this area, face recognition and interpretation has attracted …
AK Jain, A Ross, S Pankanti - IEEE transactions on information …, 2006 - ieeexplore.ieee.org
Establishing identity is becoming critical in our vastly interconnected society. Questions such as" Is she really who she claims to be?,"" Is this person authorized to use this facility?," or" Is …
Two years after the first edition, a new Fingerprint Verification Competition (FVC2002) was organized by the authors, with the aim of determining the state-of-the-art in this challenging …
A Sorokin, D Forsyth - 2008 IEEE computer society conference …, 2008 - ieeexplore.ieee.org
We show how to outsource data annotation to Amazon Mechanical Turk. Doing so has produced annotations in quite large numbers relatively cheaply. The quality is good, and …
Traditional mobile login methods, like numerical or graphical passwords, are vulnerable to passive attacks. It is common for intruders to gain access to personal information of their …