Sciweavers

657 search results - page 37 / 132
» Implementing Matching in ALE--First Results
Sort
View
AVBPA
2005
Springer
275views Biometrics» more  AVBPA 2005»
14 years 2 months ago
Vulnerabilities in Biometric Encryption Systems
Abstract. The goal of a biometric encryption system is to embed a secret into a biometric template in a way that can only be decrypted with a biometric image from the enroled perso...
Andy Adler
ICDAR
1995
IEEE
14 years 10 days ago
Handwritten word recognition for real-time applications
—A fast method of handwritten word recognition suitable for real time applications is presented in this paper. Preprocessing, segmentation and feature extraction are implemented ...
Gyeonghwan Kim, Venu Govindaraju
CORR
2010
Springer
124views Education» more  CORR 2010»
13 years 9 months ago
Feature Level Fusion of Face and Fingerprint Biometrics
The aim of this paper is to study the fusion at feature extraction level for face and fingerprint biometrics. The proposed approach is based on the fusion of the two traits by extr...
Ajita Rattani, Dakshina Ranjan Kisku, Manuele Bice...
ICRA
2010
IEEE
138views Robotics» more  ICRA 2010»
13 years 7 months ago
Maximum likelihood mapping with spectral image registration
Abstract— A core challenge in probabilistic mapping is to extract meaningful uncertainty information from data registration methods. While this has been investigated in ICP-based...
Max Pfingsthorn, Andreas Birk 0002, Sören Sch...
ICC
2009
IEEE
139views Communications» more  ICC 2009»
13 years 6 months ago
Distributed Intrusion Detection with Intelligent Network Interfaces for Future Networks
Abstract--Intrusion detection remains an important and challenging task in current and next generation networks (NGN). Emerging technologies such as multi-core processors and virtu...
Yan Luo, Ke Xiang, Jie Fan, Chunhui Zhang