Image feature extraction methods for ear biometrics--a survey

M Choras - … Conference on Computer Information Systems and …, 2007 - ieeexplore.ieee.org
The human ear is a perfect source of data for passive person identification in many
applications. In a growing need for security in various public places, ear biometrics seems to …

Multi-sensor fusion for activity recognition—A survey

AA Aguileta, RF Brena, O Mayora, E Molino-Minero-Re… - Sensors, 2019 - mdpi.com
In Ambient Intelligence (AmI), the activity a user is engaged in is an essential part of the
context, so its recognition is of paramount importance for applications in areas like sports …

A survey on ear biometrics

A Abaza, A Ross, C Hebert, MAF Harrison… - ACM computing surveys …, 2013 - dl.acm.org
Recognizing people by their ear has recently received significant attention in the literature.
Several reasons account for this trend: first, ear recognition does not suffer from some …

Gait-based person re-identification: A survey

A Nambiar, A Bernardino, JC Nascimento - ACM Computing Surveys …, 2019 - dl.acm.org
The way people walk is a strong correlate of their identity. Several studies have shown that
both humans and machines can recognize individuals just by their gait, given that proper …

Overview of the combination of biometric matchers

A Lumini, L Nanni - Information Fusion, 2017 - Elsevier
Biometric identity verification refers to technologies used to measure human physical or
behavioral characteristics, which offer a radical alternative to passports, ID cards, driving …

Personal authentication using finger knuckle surface

A Kumar, C Ravikanth - IEEE Transactions on Information …, 2009 - ieeexplore.ieee.org
This paper investigates a new approach for personal authentication using fingerback
surface imaging. The texture pattern produced by the finger knuckle bending is highly …

Multi-biometric template protection based on bloom filters

M Gomez-Barrero, C Rathgeb, G Li, R Ramachandra… - Information …, 2018 - Elsevier
Biometric verification systems are currently being deployed in numerous large-scale and
everyday applications. It is hence of the utmost importance to protect the privacy of the …

Altered fingerprints: Analysis and detection

S Yoon, J Feng, AK Jain - IEEE transactions on pattern analysis …, 2012 - ieeexplore.ieee.org
The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law
enforcement and border control applications has heightened the need for ensuring that …

Fingerprint matching

AK Jain, J Feng, K Nandakumar - Computer, 2010 - ieeexplore.ieee.org
Fingerprint matching has been successfully used by law enforcement for more than a
century. The technology is now finding many other applications such as identity …

Multiple classifier systems for robust classifier design in adversarial environments

B Biggio, G Fumera, F Roli - … Journal of Machine Learning and Cybernetics, 2010 - Springer
Pattern recognition systems are increasingly being used in adversarial environments like
network intrusion detection, spam filtering and biometric authentication and verification …