Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Bazen, Asker"'
Autor:
Bazen, Asker M. *, Gerez, Sabih H.
Publikováno v:
In Pattern Recognition 2003 36(8):1859-1867
Publikováno v:
Advances in Biometrics ISBN: 9783540311119
ICB
Advances in Biometrics: International Conference, ICB 2006, Hong Kong, China, 728-736
STARTPAGE=728;ENDPAGE=736;TITLE=Advances in Biometrics
ICB
Advances in Biometrics: International Conference, ICB 2006, Hong Kong, China, 728-736
STARTPAGE=728;ENDPAGE=736;TITLE=Advances in Biometrics
For applications like Terrorist Watch Lists and Smart Guns, a false rejection is more critical than a false acceptance. In this paper a new threat model focusing on false rejections is presented, and the “standard” architecture of a biometric sys
Autor:
Alonso Fernández, Fernando, Veldhuis, Raymond, Bazen, Asker M., Fiérrez, Julián, Ortega-García, Javier
Publikováno v:
Biblos-e Archivo. Repositorio Institucional de la UAM
instname
instname
Proceedings of the Second International Workshop on Multimodal User Authentication, Toulouse (France)
The lack of robustness against image quality degradation is a open issue in fingerprint verification. It has been found in previous studies tha
The lack of robustness against image quality degradation is a open issue in fingerprint verification. It has been found in previous studies tha
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::1dcd2076adc04d544c24430ed3f29170
http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21216
http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21216
Publikováno v:
Computer-Aided Intelligent Recognition Techniques and Applications, 119-130
STARTPAGE=119;ENDPAGE=130;TITLE=Computer-Aided Intelligent Recognition Techniques and Applications
Computer-Aided Intelligent Recognition Techniques and Applications
STARTPAGE=119;ENDPAGE=130;TITLE=Computer-Aided Intelligent Recognition Techniques and Applications
Computer-Aided Intelligent Recognition Techniques and Applications
This chapter presents a novel minutiae matching method that uses a thin-plate spline model to describe elastic distortions in fingerprints. The thin-plate spline model is estimated using a local and a global matching stage. After registration of the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::64ca6e8526cbb9452579cd2276f3f482
https://doi.org/10.1002/0470094168.ch8
https://doi.org/10.1002/0470094168.ch8
Autor:
Tuyls, P., Akkermans, Anton H.M., Kevenaar, Tom A.M., Schrijen, G.J., Bazen, Asker M., Veldhuis, Raymond N.J., Kanade, Takeo, Jain, Anil, Ratha, Nalini K.
Publikováno v:
Audio-and Video-Based Biometric Person Authentication: 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, USA, July 20-22, 2005. Proceedings, 436-446
STARTPAGE=436;ENDPAGE=446;TITLE=Audio-and Video-Based Biometric Person Authentication
Lecture Notes in Computer Science ISBN: 9783540278870
AVBPA
STARTPAGE=436;ENDPAGE=446;TITLE=Audio-and Video-Based Biometric Person Authentication
Lecture Notes in Computer Science ISBN: 9783540278870
AVBPA
In this paper we show the feasibility of template protecting biometric authentication systems. In particular, we apply template protection schemes to fingerprint data. Therefore we first make a fixed length representation of the fingerprint data by a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f4fa1af9bfe34e17c70adc0859a233c1
https://research.utwente.nl/en/publications/e4100fe7-9681-43af-ba15-3c5098a06aa5
https://research.utwente.nl/en/publications/e4100fe7-9681-43af-ba15-3c5098a06aa5
For applications like Terrorist Watch Lists and Smart Guns, a false rejection is more critical than a false acceptance. In this paper a new threat model focusing on false rejections is presented, and the 'standard' architecture of a biometric system
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::e38b0802a6dcb6a10101b6843825e11b
https://research.utwente.nl/en/publications/a-false-rejection-oriented-threat-model-for-the-design-of-biometric-authentication-systems(29a1d725-d0fc-4226-8bf0-62e446dcbb1f).html
https://research.utwente.nl/en/publications/a-false-rejection-oriented-threat-model-for-the-design-of-biometric-authentication-systems(29a1d725-d0fc-4226-8bf0-62e446dcbb1f).html
Publikováno v:
Proceedings of the 24th Symposium on Infomation Theory in the Benelux, 109-116
STARTPAGE=109;ENDPAGE=116;TITLE=Proceedings of the 24th Symposium on Infomation Theory in the Benelux
STARTPAGE=109;ENDPAGE=116;TITLE=Proceedings of the 24th Symposium on Infomation Theory in the Benelux
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::483d8339bcad878ea8e007308ee47041
https://research.utwente.nl/en/publications/biometric-verification(797b7d71-6d12-4399-bb00-29c8e1bfaabc).html
https://research.utwente.nl/en/publications/biometric-verification(797b7d71-6d12-4399-bb00-29c8e1bfaabc).html
Autor:
Bazen, Asker M.1 a.m.bazen@utwente.nl, Veldhuis, Raymond N. J.1 r.n.j.veldhuis@utwente. nl
Publikováno v:
IEEE Transactions on Circuits & Systems for Video Technology. Jan2004, Vol. 14 Issue 1, p86-94. 9p.
Autor:
Bazen, Asker M., Gerez, Sabih H.
Publikováno v:
IEEE Transactions on Pattern Analysis & Machine Intelligence. Jul2002, Vol. 24 Issue 7, p905. 15p. 1 Black and White Photograph, 12 Diagrams, 1 Graph.
Publikováno v:
Advances in Biometrics: Third International Conference, Icb 2009, Alghero, Italy, June 2-5, 2009. Proceedings; 2009, p189-198, 10p