Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
Skip to main content
    • by 
    •   13  
      Distributed ComputingHuman Computer InteractionNetwork SecurityBiometrics
    • by 
    •   5  
      Gray Level Co-occurrence MatrixSecondReference PointMulti spectral
    • by  and +1
    •   6  
      Speaker RecognitionAutomatic Speaker RecognitionSpeech ProcessingSpeaker Verification
    • by 
    •   11  
      EngineeringSignal ProcessingLogistic RegressionOPERATING SYSTEM
    • by 
    •   13  
      Computer SciencePattern RecognitionBiometricsComputer Network
    • by 
    •   14  
      Mechanical EngineeringImage ProcessingSignal ProcessingPattern Recognition
    • by 
    •   32  
      Information SystemsAlgorithmsArtificial IntelligenceSystem Identification
    • by 
    •   5  
      Signal ProcessingImage QualityReference PointMulti spectral
    • by 
    •   5  
      Gray Level Co-occurrence MatrixSecondReference PointMulti spectral
    • by 
    •   11  
      Cognitive SciencePattern RecognitionBiometricsPerformance Analysis
    • by 
    •   5  
      Pattern RecognitionComputer NetworkElectrical And Electronic EngineeringRandom Numbers
    • by 
    •   7  
      Automatic Speech RecognitionSpeech RecognitionSpeech ProcessingHidden Markov Models
    • by 
    •   8  
      Human Computer InteractionPrincipal Component AnalysisFace RecognitionAccess Control
    • by 
    •   6  
      BiometricsMathematical SciencesFusionGraphical Password Authentication
    • by 
    •   6  
      Bit Error RateFingerprint RecognitionAuthorisationEnvironmental Conditions
    • by 
    •   13  
      Image ProcessingIterative MethodsPrincipal Component AnalysisPattern Recognition
The ever increasing demand of security has resulted in wide use of Biometric systems. Despite overcoming the traditional verification problems, the unimodal systems suffer from various challenges like intra class variation, noise in the... more
    • by 
    •   4  
      System performanceProduction RuleMultimodal SystemEqual Error Rate
    • by  and +1
    •   4  
      Feature DetectionLine DetectionSignal to Noise RatioEqual Error Rate
    • by 
    •   10  
      Image ProcessingLight ScatteringBiometricsImage Restoration
    • by 
    •   20  
      Cognitive ScienceComputer ScienceEnglishAutomatic Speech Recognition
The majority of computer systems employ a login ID and password as the principal method for access security. In stand-alone situations, this level of security may be adequate, but when computers are connected to the internet, the... more
    • by 
    •   13  
      Machine LearningBack PropagationBiometricsNeural Networks
    • by 
    •   13  
      EngineeringLow FrequencyImage QualityWavelet Transform
This paper presents a robust minutiae based method for fingerprint verification. The proposed method uses Delaunay Triangulation to represent minutiae as nodes of a connected graph composed of triangles. The minimum angle over all... more
    • by  and +1
    •   5  
      FingerprintDelaunay TriangulationAngle of OrientationEqual Error Rate
    • by 
    •   15  
      Digital InvestigationVoice over IPAutomatic Speaker VerificationSpeech Communication
    • by 
    •   8  
      Statistical AnalysisVideo IndexingImage RetrievalObject Representation
    • by 
    •   4  
      ROC CurveCLEFArea Under the CurveEqual Error Rate
    • by 
    •   13  
      Image ProcessingSignal ProcessingPattern RecognitionFace Recognition
    • by 
    •   10  
      EngineeringPrincipal Component AnalysisFace RecognitionFacial Features
    • by 
    •   2  
      Biometric AuthenticationEqual Error Rate
    • by 
    •   5  
      Wavelet TransformInformation FusionReal Time ApplicationExperimental Validation
    • by 
    •   4  
      Computational GeometryCryptographySecurity AnalysisEqual Error Rate
    • by 
    •   20  
      Computer ScienceArtificial IntelligenceMachine LearningImage Analysis
    • by 
    •   8  
      EngineeringCase StudyFingerprintMultimodal Fusion
This paper presents a new approach to authenticate individuals using triangulation of hand vein images and simultaneous extraction of knuckle shape information. The proposed method is fully automated and employs palm dorsal hand vein... more
    • by 
    •   13  
      Cognitive ScienceBiometryNear InfraredHumans
    • by 
    •   9  
      Speaker RecognitionSpeech AcousticsSupport Vector MachinesNeural Network
Wavelets are widely used to extract the texture features for pattern recognition applications including biometric authentication. This can be attributed to the discriminating capability of wavelet features and the availability of fast... more
    • by 
    •   11  
      Distributed ComputingSecurityPattern RecognitionFeature Extraction
Besides the iris, conjunctival vasculature may also be used for ocular biometric recognition. Conjunctival vessel patterns can be easily observed in the visible spectrum and can compensate for off-angle or otherwise occluded iridial... more
    • by 
    •   14  
      Computer GraphicsImage ProcessingNeural NetworkImage segmentation
    • by 
    •   7  
      Pattern RecognitionBiometricsFusionMultiple Classifiers
    • by  and +1
    •   8  
      EngineeringImage ProcessingBiometricsData Fusion
    • by 
    •   14  
      Mechanical EngineeringComputer ScienceImage ProcessingPattern Recognition
    • by 
    •   13  
      Mechanical EngineeringImage ProcessingPattern RecognitionStatistical Analysis
    • by 
    •   13  
      Mechanical EngineeringImage ProcessingPattern RecognitionStatistical Analysis
    • by 
    •   13  
      Signal ProcessingSpeaker RecognitionSpeaker VerificationError Analysis
    • by 
    •   14  
      TechnologyImage ProcessingBiometricsImage segmentation
This paper proposes a novel method of image-based fingerprint matching based on the features extracted by “FingerCode”. The experiments show that our system outperforms the standard “FingerCode” recognition method and other image-based... more
    • by 
    •   13  
      EngineeringLow FrequencyImage QualityWavelet Transform
    • by 
    •   6  
      Neural NetworkEveryday LifeIntrusion DetectionMobile Device
Three simple speaker verification techniques are developed and tested using the same experimen-tal protocol. The first two methods are text-independent ones. They are based on vector quan-tization (VQ) [2, 3] and sphericity-based models... more
    • by 
    •   7  
      MathematicsSpeaker VerificationLINEAR PREDICTIVE CODINGDynamic Time Warping
    • by 
    •   6  
      Image ProcessingPattern RecognitionThree DimensionalSpatial Correlation
    • by 
    •   5  
      Feature ExtractionImage recognitionExperimental EvaluationPhase-only Correlation
One methodology for evaluating the matching performance of biometric authentication systems is the detection error tradeoff (DET) curve. The DET curve graphically illustrates the relationship between false rejects and false accepts when... more
    • by 
    •   6  
      Performance EvaluationICBBootstrap MethodBiometric Authentication