Zobrazeno 1 - 10
of 29
pro vyhledávání: '"Laurent Beslay"'
Publikováno v:
Sensors, Vol 23, Iss 8, p 4006 (2023)
The assessment of fingermark (latent fingerprint) quality is an intrinsic part of a forensic investigation. The fingermark quality indicates the value and utility of the trace evidence recovered from the crime scene in the course of a forensic invest
Externí odkaz:
https://doaj.org/article/201435ef41ef4dfcbd4bf6b66aa2276e
Publikováno v:
IEEE Access, Vol 8, Pp 145513-145534 (2020)
“The friction ridge pattern is a 3D structure which, in its natural state, is not deformed by contact with a surface”. Building upon this rather trivial observation, the present work constitutes a first solid step towards a paradigm shift in fing
Externí odkaz:
https://doaj.org/article/85635c5d4294428a911cb3671bad75ba
Publikováno v:
Journal of Imaging, Vol 7, Iss 7, p 116 (2021)
Performance evaluation of source camera attribution methods typically stop at the level of analysis of hard to interpret similarity scores. Standard analytic tools include Detection Error Trade-off or Receiver Operating Characteristic curves, or othe
Externí odkaz:
https://doaj.org/article/e88a21e21e634c97be78a7ef7e14b691
Autor:
Apostolos Malatras, Laurent Beslay
Publikováno v:
Le Journal de la Cybercriminalité & des Investigations Numériques, Vol 1, Iss 1, Pp 29-39 (2016)
Mobile botnets are an emerging security threat that aims at exploiting the wide penetration of mobile devices and systems and their vulnerabilities in the same spirit of traditional botnets. Mobile botmasters take advantage of infected mobile devices
Externí odkaz:
https://doaj.org/article/4a32c71f458341a88286f4dfd5ca5914
Publikováno v:
IEEE Access, Vol 8, Pp 145513-145534 (2020)
“The friction ridge pattern is a 3D structure which, in its natural state, is not deformed by contact with a surface”. Building upon this rather trivial observation, the present work constitutes a first solid step towards a paradigm shift in fing
Publikováno v:
BIOSIG
Fingermark quality assessment is an important step in a forensic fingerprint identification process. Often done in the scope of criminal investigation, it is performed by trained fingerprint examiners whose quality assessment can be rather subjective
Publikováno v:
Journal of Imaging
Volume 7
Issue 7
Journal of Imaging, Vol 7, Iss 116, p 116 (2021)
Volume 7
Issue 7
Journal of Imaging, Vol 7, Iss 116, p 116 (2021)
Performance evaluation of source camera attribution methods typically stop at the level of analysis of hard to interpret similarity scores. Standard analytic tools include Detection Error Trade-off or Receiver Operating Characteristic curves, or othe
Publikováno v:
IEEE Transactions on Information Forensics and Security. 14:1351-1365
Thanks to Mr. James Bond, we are aware that diamonds are forever but, are fingerprints? It is well known that biometrics brings to the security field a new paradigm; unlike traditional systems, individuals are not identified by something that they ha
Publikováno v:
Pattern Recognition. 88:614-628
Nowadays, the majority of fingerprint quality, matching and feature extraction algorithms are developed and trained on fingerprints of adults. Accordingly, the processing of children’s fingerprints presents performance issues derived for the most p
Publikováno v:
Knowledge-Based Systems. 250:109148