首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   21篇
  免费   0篇
无线电   6篇
自动化技术   15篇
  2013年   1篇
  2012年   4篇
  2011年   1篇
  2010年   1篇
  2008年   1篇
  2007年   6篇
  2005年   4篇
  2004年   1篇
  2003年   2篇
排序方式: 共有21条查询结果,搜索用时 15 毫秒
1.
A novel method for the generation of synthetic on-line signatures based on the spectral analysis and the Kinematic Theory of rapid human movements, was presented in Part I of this series of two papers. In the present paper, the experimental framework used for the validation of the novel approach is described. The validation protocol, which uses different development and test sets in order to achieve unbiased results, includes the comparison of real and synthetic databases in terms of (i) visual appearance, (ii) statistical information, and (iii) performance evaluation of three competitive and totally different verification systems. The experimental results show the high similarity existing between synthetically generated and humanly produced samples, and the great potential of the method for the study of the signature trait.  相似文献   
2.
A Comparative Study of Fingerprint Image-Quality Estimation Methods   总被引:2,自引:0,他引:2  
One of the open issues in fingerprint verification is the lack of robustness against image-quality degradation. Poor-quality images result in spurious and missing features, thus degrading the performance of the overall system. Therefore, it is important for a fingerprint recognition system to estimate the quality and validity of the captured fingerprint images. In this work, we review existing approaches for fingerprint image-quality estimation, including the rationale behind the published measures and visual examples showing their behavior under different quality conditions. We have also tested a selection of fingerprint image-quality estimation algorithms. For the experiments, we employ the BioSec multimodal baseline corpus, which includes 19 200 fingerprint images from 200 individuals acquired in two sessions with three different sensors. The behavior of the selected quality measures is compared, showing high correlation between them in most cases. The effect of low-quality samples in the verification performance is also studied for a widely available minutiae-based fingerprint matching system.  相似文献   
3.
A novel score-level fusion strategy based on quality measures for multimodal biometric authentication is presented. In the proposed method, the fusion function is adapted every time an authentication claim is performed based on the estimated quality of the sensed biometric signals at this time. Experimental results combining written signatures and quality-labelled fingerprints are reported. The proposed scheme is shown to outperform significantly the fusion approach without considering quality signals. In particular, a relative improvement of approximately 20% is obtained on the publicly available MCYT bimodal database.  相似文献   
4.
A novel score-level fusion strategy based on Bayesian adaptation for user-dependent multimodal biometric authentication is presented. In the proposed method, the fusion function is adapted for each user based on prior information extracted from a pool of users. Experimental results are reported using on-line signature and fingerprint verification subsystems on the MCYT real bimodal database. The proposed scheme outperforms both user-independent and user-dependent standard approaches. As compared to non-adapted user-dependent fusion, relative improvements of 80% and 55% are obtained for small and large training set sizes, respectively.  相似文献   
5.
The assessment of a complete minutiae-based fingerprint automatic verification system, when degrading variability factors are included, is presented. A new large public fingerprint database, the so-called MCYT Fingerprint Database, is used to evaluate the performance of the system in verification tasks. The design of this database, in terms of controlled variability in fingerprint positioning, has made it possible to determine the system performance when the test or the stored images are subject to changes in fingerprint core placing. Some procedures are proposed to cope with this problem, including a multiple-reference strategy. Human supervision and labelling of the image quality of the acquired fingerprint images has also been accomplished, permitting a precise assessment of the proposed minutiae extraction and pattern matching processes. Results, including enhanced procedures for both position variability control and image quality consideration, are presented in terms of DET plots, leading to highly competitive verification scores in terms of EER (equal error rate).  相似文献   
6.
MCYT baseline corpus: a bimodal biometric database   总被引:1,自引:0,他引:1  
The current need for large multimodal databases to evaluate automatic biometric recognition systems has motivated the development of the MCYT bimodal database. The main purpose has been to consider a large scale population, with statistical significance, in a real multimodal procedure, and including several sources of variability that can be found in real environments. The acquisition process, contents and availability of the single-session baseline corpus are fully described. Some experiments showing consistency of data through the different acquisition sites and assessing data quality are also presented.  相似文献   
7.
Securing the exchange of intellectual property and providing protection to multimedia contents in distribution systems have enabled the advent of digital rights management (DRM) systems. User authentication, a key component of any DRM system, ensures that only those with specific rights are able to access the digital information. It is here that biometrics play an essential role. It reinforces security at all stages where customer authentication is needed. Biometric recognition, as a means of personal authentication, is an emerging signal processing area focused on increasing security and convenience of use in applications where users need to be securely identified. In this article, we outline the state-of-the-art of several popular biometric modalities and technologies and provide specific applications where biometric recognition may be beneficially incorporated. In addition, the article also discussed integration strategies of biometric authentication technologies into DRM systems that satisfy the needs and requirements of consumers, content providers, and payment brokers, securing delivery channels and contents.  相似文献   
8.
A binary iriscode is a very compact representation of an iris image. For a long time it was assumed that the iriscode did not contain enough information to allow for the reconstruction of the original iris. The present work proposes a novel probabilistic approach based on genetic algorithms to reconstruct iris images from binary templates and analyzes the similarity between the reconstructed synthetic iris image and the original one. The performance of the reconstruction technique is assessed by empirically estimating the probability of successfully matching the synthesized iris image against its true counterpart using a commercial matcher. The experimental results indicate that the reconstructed images look reasonably realistic. While a human expert may not be easily deceived by them, they can successfully deceive a commercial matcher. Furthermore, since the proposed methodology is able to synthesize multiple iris images from a single iriscode, it has other potential applications including privacy enhancement of iris-based systems.  相似文献   
9.
The theoretical framework and algorithms of a novel method for the generation of synthetic on-line signatures are presented. This model-based approach combines the spectral analysis of real signatures with the Kinematic Theory of rapid human movements in order to generate totally synthetic specimens. Two different algorithms are also described in order to produce duplicated samples from the synthetic master signatures, so that the generation scheme as a whole is able to produce in a complete automatic fashion huge synthetic databases. Typical examples of synthetic specimens are presented to highlight their human-like appearance. The validation protocol and the test results are presented and discussed in a companion paper.  相似文献   
10.
We report on experiments for the fingerprint modality conducted during the First BioSecure Residential Workshop. Two reference systems for fingerprint verification have been tested together with two additional non-reference systems. These systems follow different approaches of fingerprint processing and are discussed in detail. Fusion experiments I volving different combinations of the available systems are presented. The experimental results show that the best recognition strategy involves both minutiae-based and correlation-based measurements. Regarding the fusion experiments, the best relative improvement is obtained when fusing systems that are based on heterogeneous strategies for feature extraction and/or matching. The best combinations of two/three/four systems always include the best individual systems whereas the best verification performance is obtained when combining all the available systems.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号