Sciweavers

347 search results - page 5 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
ICCSA
2007
Springer
15 years 4 months ago
Tracing Illegal Users of Video: Reconsideration of Tree-Specific and Endbuyer-Specific Methods
In our recent study, we have presented an approach for tracing illegal users in content distribution networks using watermarking and fingerprinting techniques [1][2]. In this paper...
Hyun-Ho Kang, Brian M. Kurkoski, Kazuhiko Yamaguch...
PAMI
2012
13 years 8 days ago
Altered Fingerprints: Analysis and Detection
—The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring that the...
Soweon Yoon, Jianjiang Feng, Anil K. Jain
ICIAP
2005
ACM
15 years 10 months ago
Combining Multiple Matchers for Fingerprint Verification: A Case Study in FVC2004
Abstract. Combining different algorithms submitted to the Third International Fingerprint Verification Competition (FVC2004) is studied. For this work, the matching results of more...
Julian Fiérrez-Aguilar, Loris Nanni, Javier...