Results 1 - 10
of
15
Effect of severe image compression on iris recognition performance
, 2007
"... Effect of severe image compression on iris recognition performance ..."
Abstract
-
Cited by 17 (0 self)
- Add to MetaCart
(Show Context)
Effect of severe image compression on iris recognition performance
Improving the Enrollment in Dynamic Signature Verification with Synthetic Samples
"... A novel scheme to generate multiple synthetic samples from a real on-line handwritten signature is proposed. The algorithm models a transmission channel which introduces a certain distortion into the real signature to produce the different synthetic samples. The method is used to increase the amount ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
(Show Context)
A novel scheme to generate multiple synthetic samples from a real on-line handwritten signature is proposed. The algorithm models a transmission channel which introduces a certain distortion into the real signature to produce the different synthetic samples. The method is used to increase the amount of data of the clients enrolling on a state-ofthe-art HMM-based signature verification system. The enhanced enrollment results in performance improve up to 70 % between the case in which only one real sample of the user was available for the training, and the case where the proposed algorithm was used to generate additional synthetic training data. 1.
Evaluation of Brute-Force Attack to Dynamic Signature Verification Using Synthetic Samples
"... A brute force attack using synthetically generated handwritten signatures is performed against a HMM-based signature recognition system. The generation algorithm of synthetic signatures is based on the spectral analysis of the trajectory functions and has proven to produce very realistic results. Th ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
(Show Context)
A brute force attack using synthetically generated handwritten signatures is performed against a HMM-based signature recognition system. The generation algorithm of synthetic signatures is based on the spectral analysis of the trajectory functions and has proven to produce very realistic results. The experiments are carried out by attacking real signature models from the MCYT database (which comprises 8,250 signature samples from 330 users). Results show that such an attack is feasible, thus arising the necessity of introducing countermeasures against this type of vulnerability in real applications. 1
Iris image reconstruction from binary templates: An efficient . . .
- COMPUTER VISION AND IMAGE UNDERSTANDING
, 2013
"... ..."
ON A LOCAL ORDINAL BINARY EXTENSION TO GABOR WAVELET-BASED ENCODING FOR IMPROVED IRIS RECOGNITION
"... Daugman’s iris recognition algorithm introduced in early 90s and later undergoing continuous refinements remains potentially the most efficient and scalable in iris field. The encoding part of the algorithm relies on application of Gabor wavelets that in terms of their imaging capabilities mimic cap ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
(Show Context)
Daugman’s iris recognition algorithm introduced in early 90s and later undergoing continuous refinements remains potentially the most efficient and scalable in iris field. The encoding part of the algorithm relies on application of Gabor wavelets that in terms of their imaging capabilities mimic capabilities of human eye receptor field. In this work, we design and test an algorithm that can be used both individually and as a natural extension scheme to Gabor wavelet-based algorithm. It is based on the local ordinal information extracted from original unfiltered images. This scheme holds a number of promises: (1) it is robust with respect to a number of nonidealities in iris images and (2) because of the binary nature of the local ordinal information this scheme can be flawlessly integrated into the traditional filter-based recognition systems. The proposed scheme was extensively tested individually and when combined with Gabor wavelet-based approach. 1.
Kinematical analysis of synthetic dynamic signatures using the sigma-lognormal model
- in: Proceedings of the IAPR International Conference on Frontiers of Handwriting Recognition (ICFHR
, 2010
"... ..."
(Show Context)
2009 10th International Conference on Document Analysis and Recognition Evaluation of Brute-Force Attack to Dynamic Signature Verification Using Synthetic Samples
"... A brute force attack using synthetically generated handwritten signatures is performed against a HMM-based signature recognition system. The generation algorithm of synthetic signatures is based on the spectral analysis of the trajectory functions and has proven to produce very realistic results. Th ..."
Abstract
- Add to MetaCart
(Show Context)
A brute force attack using synthetically generated handwritten signatures is performed against a HMM-based signature recognition system. The generation algorithm of synthetic signatures is based on the spectral analysis of the trajectory functions and has proven to produce very realistic results. The experiments are carried out by attacking real signature models from the MCYT database (which comprises 8,250 signature samples from 330 users). Results show that such an attack is feasible, thus arising the necessity of introducing countermeasures against this type of vulnerability in real applications. 1
2010 12th International Conference on Frontiers in Handwriting Recognition Kinematical Analysis of Synthetic Dynamic Signatures Using the Sigma-Lognormal Model
"... Abstract—The kinematical information present in synthetically generated signatures is analyzed using the Sigma-Lognormal model and compared to the kinematical properties of real samples. Experiments are carried out on totally independent development and test sets and show a high degree of similarity ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract—The kinematical information present in synthetically generated signatures is analyzed using the Sigma-Lognormal model and compared to the kinematical properties of real samples. Experiments are carried out on totally independent development and test sets and show a high degree of similarity between humanly produced and artificial signatures. One particular flaw is found in the velocity profile of synthetic signatures. Two possible solutions are proposed to improve the synthetic generation method using the Kinematic Theory of rapid human movements. Keywords-signature; synthetic generation; kinematical information; Sigma-Lognormal model; I.
unknown title
"... A person only has two irises – if his pattern is stolen he quickly runs out of alternatives. Thus methods that protect the true iris pattern need to be adopted in practical biometric applications. In particular, it is desirable to have a system that can generate a new unique pattern if the one being ..."
Abstract
- Add to MetaCart
(Show Context)
A person only has two irises – if his pattern is stolen he quickly runs out of alternatives. Thus methods that protect the true iris pattern need to be adopted in practical biometric applications. In particular, it is desirable to have a system that can generate a new unique pattern if the one being used is lost, or generate different unique patterns for different applications to prevent cross-matching. For backwards compatibility, these patterns should look like plausible irises so they can be handled with the same processing tools. However, they should also non-invertibly hide the true biometric so it is never exposed, or even stored. In this paper four such “cancelable ” biometric methods are proposed that work with conventional iris recognition systems, either at the unwrapped image level or at the binary iris code level. 1.