Automatic signature verification: The state of the art

D Impedovo, G Pirlo - IEEE Transactions on Systems, Man, and …, 2008 - ieeexplore.ieee.org
In recent years, along with the extraordinary diffusion of the Internet and a growing need for
personal verification in many daily applications, automatic signature verification is being …

[PDF][PDF] Biometric authentication: A review

D Bhattacharyya, R Ranjan… - … Journal of u-and e …, 2009 - biometrie-online.net
Advances in the field of Information Technology also make Information Security an
inseparable part of it. In order to deal with security, Authentication plays an important role …

Profiling a warehouse-scale computer

S Kanev, JP Darago, K Hazelwood… - Proceedings of the …, 2015 - dl.acm.org
With the increasing prevalence of warehouse-scale (WSC) and cloud computing,
understanding the interactions of server applications with the underlying microarchitecture …

[图书][B] Handbook of fingerprint recognition

D Maltoni, D Maio, AK Jain, S Prabhakar - 2009 - Springer
Biometric recognition, or simply biometrics, refers to the use of distinctive anatomical and/or
behavioral characteristics or identifiers (eg, fingerprints, face, iris, voice, and hand geometry) …

How iris recognition works

J Daugman - The essential guide to image processing, 2009 - Elsevier
Publisher Summary This chapter explains the iris recognition algorithms and presents
results of 9.1 million comparisons among eye images from trials in Britain, the USA, Japan …

[图书][B] Template matching techniques in computer vision: theory and practice

R Brunelli - 2009 - books.google.com
The detection and recognition of objects in images is a key research topic in the computer
vision community. Within this area, face recognition and interpretation has attracted …

Biometrics: a tool for information security

AK Jain, A Ross, S Pankanti - IEEE transactions on information …, 2006 - ieeexplore.ieee.org
Establishing identity is becoming critical in our vastly interconnected society. Questions such
as" Is she really who she claims to be?,"" Is this person authorized to use this facility?," or" Is …

FVC2002: Second fingerprint verification competition

D Maio, D Maltoni, R Cappelli… - … conference on pattern …, 2002 - ieeexplore.ieee.org
Two years after the first edition, a new Fingerprint Verification Competition (FVC2002) was
organized by the authors, with the aim of determining the state-of-the-art in this challenging …

Utility data annotation with amazon mechanical turk

A Sorokin, D Forsyth - 2008 IEEE computer society conference …, 2008 - ieeexplore.ieee.org
We show how to outsource data annotation to Amazon Mechanical Turk. Doing so has
produced annotations in quite large numbers relatively cheaply. The quality is good, and …

ECG authentication for mobile devices

JS Arteaga-Falconi, H Al Osman… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Traditional mobile login methods, like numerical or graphical passwords, are vulnerable to
passive attacks. It is common for intruders to gain access to personal information of their …