Facial aging has been only partially studied in the past and mostly in a qualitative way. This paper presents a novel approach to the estimation of facial aging aimed to the quanti...
Marcos Ortega, Linda Brodo, Manuele Bicego, Massim...
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
—A method of embedding data in a JPEG color image for applications such as authentication of an employee carrying a picture identification card is described. Embedding of data, s...
Abstract-- This work studies the performance of a stateof-the-art fingerprint recognition technology, in several practical scenarios of interest in forensic casework. First, the di...
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Num...