Results 1 - 10
of
1,662
Intelligent Biometric Information Management
, 2010
"... We advance here a novel methodology for robust intelligent biometric information management with inferences and predictions made using randomness and complexity concepts. Intelligence refers to learning, adaptation, and functionality, and robustness refers to the ability to handle incomplete and/or ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
We advance here a novel methodology for robust intelligent biometric information management with inferences and predictions made using randomness and complexity concepts. Intelligence refers to learning, adaptation, and functionality, and robustness refers to the ability to handle incomplete and
Embedding Biometric Information into Anonymous
"... Anonymous credentials allow people to authenticate to an organisation without being identified. While there are some approaches trying to ensure non-transferability we want to improve the methods relying on biometric authentication. In this working paper we present a first step of embedding biometri ..."
Abstract
- Add to MetaCart
Anonymous credentials allow people to authenticate to an organisation without being identified. While there are some approaches trying to ensure non-transferability we want to improve the methods relying on biometric authentication. In this working paper we present a first step of embedding
Measuring Biometric Sample Quality in Terms of Biometric Information
- Proc. Biometric Consortium Conf.: Special Session on Research at the Biometrics Symp., IEEE
"... This paper develops a new approach to understand and measure variations in biometric sample quality. We begin with the intuition that degradations to a biometric sample will reduce the amount of identi able information available. In order to measure the amount of identi able information, we de ne bi ..."
Abstract
-
Cited by 9 (0 self)
- Add to MetaCart
This paper develops a new approach to understand and measure variations in biometric sample quality. We begin with the intuition that degradations to a biometric sample will reduce the amount of identi able information available. In order to measure the amount of identi able information, we de ne
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
, 2008
"... We provide formal definitions and efficient secure techniques for • turning noisy information into keys usable for any cryptographic application, and, in particular, • reliably and securely authenticating biometric data. Our techniques apply not just to biometric information, but to any keying mater ..."
Abstract
-
Cited by 535 (38 self)
- Add to MetaCart
We provide formal definitions and efficient secure techniques for • turning noisy information into keys usable for any cryptographic application, and, in particular, • reliably and securely authenticating biometric data. Our techniques apply not just to biometric information, but to any keying
S.: Towards a Measure of Biometric Information
, 2006
"... This paper addresses the issue of the information content of a biometric image or system. We define biometric information as the decrease in uncertainty about the identity of a person due to a set of biometric measurements. We then show that the biometric information for a person may be calculated b ..."
Abstract
-
Cited by 9 (1 self)
- Add to MetaCart
This paper addresses the issue of the information content of a biometric image or system. We define biometric information as the decrease in uncertainty about the identity of a person due to a set of biometric measurements. We then show that the biometric information for a person may be calculated
Controlling leakage of biometric information using dithering
- in Proc. EUSIPCO
"... Fuzzy extractors allow cryptographic keys to be generated from noisy, non-uniform biometric data. Fuzzy extractors can be used to authenticate a user to a server without storing her biometric data directly. However, in the Information Theoretic sense fuzzy extractors will leak information about the ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
Fuzzy extractors allow cryptographic keys to be generated from noisy, non-uniform biometric data. Fuzzy extractors can be used to authenticate a user to a server without storing her biometric data directly. However, in the Information Theoretic sense fuzzy extractors will leak information about
Pedestrian detection using stereo and biometric information
- In Int. Conf. on Image Analysis and Recognition
, 2006
"... Abstract. A method for pedestrian detection from real world outdoor scenes is presented in this paper. The technique uses disparity information, ground plane estimation and biometric information based on the golden ratio. It can detect pedestrians even in the presence of severe occlusion or a lack o ..."
Abstract
-
Cited by 7 (4 self)
- Add to MetaCart
Abstract. A method for pedestrian detection from real world outdoor scenes is presented in this paper. The technique uses disparity information, ground plane estimation and biometric information based on the golden ratio. It can detect pedestrians even in the presence of severe occlusion or a lack
Analog approach to analysis and modeling of biometric information
"... Most of the current biometric techniques are based on logic (digital) driven approaches, which are often computationally expensive and can be found in dissonance with the continuous nature of both the biometric information itself and the human perception. Biometric information is best represented by ..."
Abstract
- Add to MetaCart
Most of the current biometric techniques are based on logic (digital) driven approaches, which are often computationally expensive and can be found in dissonance with the continuous nature of both the biometric information itself and the human perception. Biometric information is best represented
Facial Skin Texture as a Source of Biometric Information
"... This paper investigates the possibility of exploiting facial skin texture as a source of biometric information to facilitate automatic recognition of individuals. Such ability may be particularly important in circumstances when a full view of the face may not be available. The proposed algorithm aut ..."
Abstract
- Add to MetaCart
This paper investigates the possibility of exploiting facial skin texture as a source of biometric information to facilitate automatic recognition of individuals. Such ability may be particularly important in circumstances when a full view of the face may not be available. The proposed algorithm
Information fusion in biometrics
- Pattern Recognition Letters
, 2003
"... User verification systems that use a single biometric indicator often have to contend with noisy sensor data, restricted degrees of freedom, non-universality of the biometric trait and unacceptable error rates. Attempting to improve the performance of individual matchers in such situations may not p ..."
Abstract
-
Cited by 292 (17 self)
- Add to MetaCart
, multibiometric systems provide anti-spoofing measures by making it difficult for an intruder to spoof multiple biometric traits simultaneously. However, an effective fusion scheme is necessary to combine the information presented by multiple domain experts. This paper addresses the problem of information fusion
Results 1 - 10
of
1,662