Privacy in mobile technology for personal healthcare

S Avancha, A Baxi, D Kotz - ACM Computing Surveys (CSUR), 2012 - dl.acm.org
Information technology can improve the quality, efficiency, and cost of healthcare. In this
survey, we examine the privacy requirements of mobile computing technologies that have …

A comparative study of palmprint recognition algorithms

D Zhang, W Zuo, F Yue - ACM computing surveys (CSUR), 2012 - dl.acm.org
Palmprint images contain rich unique features for reliable human identification, which makes
it a very competitive topic in biometric research. A great many different low resolution …

The OU-ISIR gait database comprising the large population dataset and performance evaluation of gait recognition

H Iwama, M Okumura, Y Makihara… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
This paper describes the world's largest gait database-the “OU-ISIR Gait Database, Large
Population Dataset”-and its application to a statistically reliable performance evaluation of …

Altered fingerprints: Analysis and detection

S Yoon, J Feng, AK Jain - IEEE transactions on pattern analysis …, 2012 - ieeexplore.ieee.org
The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law
enforcement and border control applications has heightened the need for ensuring that …

Feature-level fusion of fingerprint and finger-vein for personal identification

J Yang, X Zhang - Pattern Recognition Letters, 2012 - Elsevier
Multimodal biometrics based on feature-level fusion is a significant topic in personal
identification research community. In this paper, a new fingerprint-vein based biometric …

Latent fingerprint matching using descriptor-based hough transform

AA Paulino, J Feng, AK Jain - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Identifying suspects based on impressions of fingers lifted from crime scenes (latent prints) is
a routine procedure that is extremely important to forensics and law enforcement agencies …

Biometric recognition: an overview

AK Jain, A Kumar - Second generation biometrics: The ethical, legal and …, 2012 - Springer
Prevailing methods of human identification based on credentials (identification documents
and PIN) are not able to meet the growing demands for stringent security in applications …

Security evaluation of biometric authentication systems under real spoofing attacks

B Biggio, Z Akhtar, G Fumera, GL Marcialis, F Roli - IET biometrics, 2012 - IET
Multimodal biometric systems are commonly believed to be more robust to spoofing attacks
than unimodal systems, as they combine information coming from different biometric traits …

Periocular recognition: Analysis of performance degradation factors

CN Padole, H Proenca - 2012 5th IAPR international …, 2012 - ieeexplore.ieee.org
Among the available biometric traits such as face, iris and fingerprint, there is an active
research being carried out in the direction of unconstrained biometrics. Periocular …

Dictionary-based face recognition from video

YC Chen, VM Patel, PJ Phillips… - Computer Vision–ECCV …, 2012 - Springer
The main challenge in recognizing faces in video is effectively exploiting the multiple frames
of a face and the accompanying dynamic signature. One prominent method is based on …