Sciweavers

ICB
2007
Springer
106views Biometrics» more  ICB 2007»
14 years 5 months ago
Vitality Detection from Fingerprint Images: A Critical Survey
Although fingerprint verification systems reached a high degree of accuracy, it has been recently shown that they can be circumvented by “fake fingers”, namely, fingerprint ima...
Pietro Coli, Gian Luca Marcialis, Fabio Roli
ICB
2007
Springer
156views Biometrics» more  ICB 2007»
14 years 5 months ago
Robust Extraction of Secret Bits from Minutiae
Abstract. Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
Ee-Chien Chang, Sujoy Roy
ICB
2007
Springer
135views Biometrics» more  ICB 2007»
14 years 5 months ago
Feeling Is Believing: A Secure Template Exchange Protocol
We use grip pattern based biometrics as a secure side channel to achieve pre-authentication in a protocol that sets up a secure channel between two hand held devices. The protocol ...
Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Ray...
ICB
2007
Springer
79views Biometrics» more  ICB 2007»
14 years 5 months ago
On Some Performance Indices for Biometric Identification System
This paper investigates a new approach to formulate performance indices of biometric system using information theoretic models. The performance indices proposed here (unlike conven...
Jay Bhatnagar, Ajay Kumar
ICB
2007
Springer
134views Biometrics» more  ICB 2007»
14 years 5 months ago
Singular Points Analysis in Fingerprints Based on Topological Structure and Orientation Field
Abstract. As an important feature of fingerprints, singular points (includingcores and deltas) not only represent the local ridge pattern characteristics, but also determine the to...
Jie Zhou, Jinwei Gu, David Zhang
ICB
2007
Springer
117views Biometrics» more  ICB 2007»
14 years 5 months ago
Wolf Attack Probability: A New Security Measure in Biometric Authentication Systems
This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a...
Masashi Une, Akira Otsuka, Hideki Imai
ICB
2007
Springer
122views Biometrics» more  ICB 2007»
14 years 5 months ago
Biometric Fuzzy Extractors Made Practical: A Proposal Based on FingerCodes
Valérie Viet Triem Tong, Hervé Siber...
ICB
2007
Springer
136views Biometrics» more  ICB 2007»
14 years 5 months ago
Distance Measures for Gabor Jets-Based Face Authentication: A Comparative Evaluation
Local Gabor features (jets) have been widely used in face recognition systems. Once the sets of jets have been extracted from the two faces to be compared, a proper measure of simi...
Daniel González-Jiménez, Manuele Bic...
ICB
2007
Springer
129views Biometrics» more  ICB 2007»
14 years 5 months ago
Feature Correlation Filter for Face Recognition
The correlation filters for pattern recognition, have been extensively studied in the areas of automatic target recognition(ATR) and biometrics. Whereas the conventional correlati...
XiangXin Zhu, ShengCai Liao, Zhen Lei, Rong Liu, S...