Sciweavers

485 search results - page 85 / 97
» On the Individuality of the Iris Biometric
Sort
View
WEBI
2009
Springer
14 years 3 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
GREC
2007
Springer
14 years 3 months ago
A System to Segment Text and Symbols from Color Maps
Automatic separation of text and symbols from graphics in document image is one of the fundamental aims in graphics recognition. In maps, separation of text and symbols from graphi...
Partha Pratim Roy, Eduard Vazquez, Josep Llad&oacu...
ICB
2007
Springer
205views Biometrics» more  ICB 2007»
14 years 3 months ago
Embedded Palmprint Recognition System on Mobile Devices
There are increasing requirements for mobile personal identification, e.g. to protect identity theft in wireless applications. Based on built-in cameras of mobile devices, palmprin...
Yufei Han, Tieniu Tan, Zhenan Sun, Ying Hao
ICB
2007
Springer
308views Biometrics» more  ICB 2007»
14 years 3 months ago
Learning Multi-scale Block Local Binary Patterns for Face Recognition
Abstract. In this paper, we propose a novel representation, called Multiscale Block Local Binary Pattern (MB-LBP), and apply it to face recognition. The Local Binary Pattern (LBP) ...
ShengCai Liao, XiangXin Zhu, Zhen Lei, Lun Zhang, ...
FGR
2006
IEEE
139views Biometrics» more  FGR 2006»
14 years 2 months ago
Accurate Face Localisation for Faces under Active Near-IR Illumination
In this paper we propose a novel approach to accurate face localisation for faces under Near-Infrared (Near-IR) illumination. The circular shape of the bright pupils is a scale an...
Xuan Zou, Josef Kittler, Kieron Messer