Sciweavers

107 search results - page 20 / 22
» DCT-Based Iris Recognition
Sort
View
ECCV
2004
Springer
14 years 1 months ago
Integrating Faces, Fingerprints, and Soft Biometric Traits for User Recognition
Soft biometric traits like gender, age, height, weight, ethnicity, and eye color cannot provide reliable user recognition because they are not distinctive and permanent. However, s...
Anil K. Jain, Karthik Nandakumar, Xiaoguang Lu, Un...
PRDC
2006
IEEE
14 years 2 months ago
Base Address Recognition with Data Flow Tracking for Injection Attack Detection
Vulnerabilities such as buffer overflows exist in some programs, and such vulnerabilities are susceptible to address injection attacks. The input data tracking method, which was ...
Satoshi Katsunuma, Hiroyuki Kurita, Ryota Shioya, ...
IRI
2008
IEEE
14 years 2 months ago
Robust integration of multiple information sources by view completion
There are many applications where multiple data sources, each with its own features, are integrated in order to perform an inference task in an optimal way. Researchers have shown...
Shankara B. Subramanya, Baoxin Li, Huan Liu
TIFS
2008
129views more  TIFS 2008»
13 years 8 months ago
On Empirical Recognition Capacity of Biometric Systems Under Global PCA and ICA Encoding
Performance of biometric-based recognition systems depends on various factors: database quality, image preprocessing, encoding techniques, etc. Given a biometric database and a se...
Natalia A. Schmid, Francesco Nicolo
ICIAR
2010
Springer
14 years 1 months ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl