Sciweavers

78 search results - page 4 / 16
» Identity Verification by Using Handprint
Sort
View
ICB
2009
Springer
156views Biometrics» more  ICB 2009»
13 years 5 months ago
Efficient Biometric Verification in Encrypted Domain
Biometric authentication over public networks leads to a variety of privacy issues that needs to be addressed before it can become popular. The primary concerns are that the biomet...
Maneesh Upmanyu, Anoop M. Namboodiri, K. Srinathan...
BIOSIG
2009
152views Biometrics» more  BIOSIG 2009»
13 years 5 months ago
A Survey of Distributed Biometric Authentication Systems
: In ACISP'07, Bringer et al proposed a new approach for remote biometric based verification, which consists of a hybrid protocol that distributes the server side functionalit...
Neyire Deniz Sarier
CIARP
2003
Springer
14 years 20 days ago
Online Handwritten Signature Verification Using Hidden Markov Models
Most people are used to signing documents and because of this, it is a trusted and natural method for user identity verification, reducing the cost of password maintenance and decr...
Juan J. Igarza, Iñaki Goirizelaia, Koldo Es...
ICASSP
2009
IEEE
14 years 2 months ago
Humming-based human verification and identification
This paper considers humming-based human verification and identification systems. Humming of a target person is modeled as a Gaussian mixture model, and the matching score betwe...
Minho Jin, Jaewook Kim, Chang D. Yoo
ICASSP
2011
IEEE
12 years 11 months ago
Factored covariance modeling for text-independent speaker verification
Gaussian mixture models (GMMs) are commonly used to model the spectral distribution of speech signals for text-independent speaker verification. Mean vectors of the GMM, used in c...
Eryu Wang, Kong-Aik Lee, Bin Ma, Haizhou Li, Wu Gu...