Sciweavers

240 search results - page 44 / 48
» From fingerprint to writeprint
Sort
View
GCB
2009
Springer
139views Biometrics» more  GCB 2009»
14 years 1 months ago
Graph-Kernels for the Comparative Analysis of Protein Active Sites
Abstract: Graphs are often used to describe and analyze the geometry and physicochemical composition of biomolecular structures, such as chemical compounds and protein active sites...
Thomas Fober, Marco Mernberger, Ralph Moritz, Eyke...
DRM
2008
Springer
13 years 11 months ago
A decision theoretic framework for analyzing binary hash-based content identification systems
Content identification has many applications, ranging from preventing illegal sharing of copyrighted content on video sharing websites, to automatic identification and tagging of ...
Avinash L. Varna, Ashwin Swaminathan, Min Wu
DPHOTO
2010
208views Hardware» more  DPHOTO 2010»
13 years 11 months ago
A signature analysis based method for elliptical shape
The high level context image analysis regards many fields as face recognition, smile detection, automatic red eye removal, iris recognition, fingerprint verification, etc. Techniq...
Ivana Guarneri, Mirko Guarnera, Giuseppe Messina, ...
MEDIAFORENSICS
2010
13 years 11 months ago
Better security levels for broken arrows
This paper considers the security aspect of the robust zero-bit watermarking technique `Broken Arrows'(BA),1 which was invented and tested for the international challenge BOW...
Fuchun Xie, Teddy Furon, Caroline Fontaine
SSWMC
2004
13 years 11 months ago
Towards fraud-proof ID documents using multiple data hiding technologies and biometrics
Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric ...
Justin Picard, Claus Vielhauer, Niels J. Thorwirth