[PDF][PDF] Biometrics of next generation: An overview

AK Jain, A Kumar - Second generation biometrics, 2010 - Citeseer
Prevailing methods of human identification based on credentials (identification documents
and PIN) are not able to meet the growing demands for stringent security in applications …

Face liveness detection from a single image with sparse low rank bilinear discriminative model

X Tan, Y Li, J Liu, L Jiang - Computer Vision–ECCV 2010: 11th European …, 2010 - Springer
Spoofing with photograph or video is one of the most common manner to circumvent a face
recognition system. In this paper, we present a real-time and non-intrusive method to …

Online finger-knuckle-print verification for personal authentication

L Zhang, L Zhang, D Zhang, H Zhu - Pattern recognition, 2010 - Elsevier
Biometric based personal authentication is an effective method for automatically
recognizing, with a high confidence, a person's identity. By observing that the texture pattern …

Periocular biometrics in the visible spectrum

U Park, RR Jillela, A Ross… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
The term periocular refers to the facial region in the immediate vicinity of the eye. Acquisition
of the periocular biometric is expected to require less subject cooperation while permitting a …

[图书][B] Image fusion: theories, techniques and applications

HB Mitchell - 2010 - books.google.com
The purpose of this book is to provide a practical introduction to the th-ries, techniques and
applications of image fusion. The present work has been designed as a textbook for a one …

Soft biometric traits for continuous user authentication

K Niinuma, U Park, AK Jain - IEEE Transactions on information …, 2010 - ieeexplore.ieee.org
Most existing computer and network systems authenticate a user only at the initial login
session. This could be a critical security weakness, especially for high-security systems …

Fingerprint matching

AK Jain, J Feng, K Nandakumar - Computer, 2010 - ieeexplore.ieee.org
Fingerprint matching has been successfully used by law enforcement for more than a
century. The technology is now finding many other applications such as identity …

Multiple classifier systems for robust classifier design in adversarial environments

B Biggio, G Fumera, F Roli - … Journal of Machine Learning and Cybernetics, 2010 - Springer
Pattern recognition systems are increasingly being used in adversarial environments like
network intrusion detection, spam filtering and biometric authentication and verification …

Visual cryptography for biometric privacy

A Ross, A Othman - IEEE transactions on information forensics …, 2010 - ieeexplore.ieee.org
Preserving the privacy of digital biometric data (eg, face images) stored in a central
database has become of paramount importance. This work explores the possibility of using …

[PDF][PDF] Discriminant analysis for dimensionality reduction: An overview of recent developments

J Ye, S Ji - Biometrics: Theory, Methods, and Applications. Wiley …, 2010 - Citeseer
Many biometric applications such as face recognition involve data with a large number of
features [1–3]. Analysis of such data is challenging due to the curse-ofdimensionality [4, 5] …