Sciweavers

485 search results - page 63 / 97
» Authentication by Biometric Verification
Sort
View
ICB
2007
Springer
124views Biometrics» more  ICB 2007»
15 years 3 months ago
Face Authentication with Salient Local Features and Static Bayesian Network
In this paper, the problem of face authentication using salient facial features together with statistical generative models is adressed. Actually, classical generative models, and ...
Guillaume Heusch, Sébastien Marcel
AVBPA
2005
Springer
279views Biometrics» more  AVBPA 2005»
15 years 3 months ago
On Combining Textural and Geometrical Scores for Discriminative Face Authentication
Abstract. In this paper, a combined shape-texture approach to discriminative face authentication is studied. Facial texture information is captured through Gabor responses (jets), ...
José Luis Alba-Castro, Daniel Gonzál...
ICC
2007
IEEE
126views Communications» more  ICC 2007»
15 years 4 months ago
Estimating Ridge Topologies with High Curvature for Fingerprint Authentication Systems
— An orientation model provides an analytical means for describing fingerprint ridge orientations. It can help in data storage and recovery as well as other possible communicati...
Yi Wang, Jiankun Hu
ICPR
2002
IEEE
15 years 10 months ago
Hiding a Face in a Fingerprint Image
With the wide spread utilization of biometric identification systems, establishing the authenticity of biometric data itself has emerged as an important research issue. We present...
Anil K. Jain, Umut Uludag, Rein-Lien Hsu
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
15 years 3 months ago
Public-Key-Infrastructure Based on a Peer-to-Peer Network
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Thomas Wölfl