Sciweavers

714 search results - page 128 / 143
» Verification and Compliance Testing
Sort
View
DPHOTO
2010
208views Hardware» more  DPHOTO 2010»
13 years 10 months ago
A signature analysis based method for elliptical shape
The high level context image analysis regards many fields as face recognition, smile detection, automatic red eye removal, iris recognition, fingerprint verification, etc. Techniq...
Ivana Guarneri, Mirko Guarnera, Giuseppe Messina, ...
LREC
2008
119views Education» more  LREC 2008»
13 years 10 months ago
Text Independent Speaker Identification in Multilingual Environments
Speaker identification and verification systems have a poor performance when model training is done in one language while the testing is done in another. This situation is not unu...
Iker Luengo, Eva Navas, Iñaki Sainz, Ibon S...
BIOSIG
2003
145views Biometrics» more  BIOSIG 2003»
13 years 10 months ago
Pass Phrase Based Speaker Recognition for Authentication
: Speaker recognition in applications of our daily lives is not yet in widespread use. In order for biometric technology to make sense for real-world authentication applications an...
Heinz Hertlein, Robert Frischholz, Elmar Nöth
BMVC
1998
13 years 10 months ago
Writer Identification from Non-uniformly Skewed Handwriting Images
Many techniques have been reported for handwriting-based writer identification. Most such techniques assume that the written text is fixed (e.g., in signature verification). In th...
H. E. S. Said, G. S. Peake, T. N. Tan, Keith D. Ba...
FIW
2000
114views Communications» more  FIW 2000»
13 years 10 months ago
Feature Interaction in Internet Telephony
While Internet telephony aims to provide services at least equal to traditional telephony, the architecture of Internet telephony is sufficiently different to make it necessary to ...
Jonathan Lennox, Henning Schulzrinne