Search results for "Biometrics"

showing 10 items of 60 documents

Palmprint principal lines extraction

2014

The palmprint recognition has become a focus in biological recognition and image processing fields. In this process, the features extraction (with particular attention to palmprint principal line extraction) is especially important. Although a lot of work has been reported, the representation of palmprint is still an open issue. In this paper we propose a simple, efficient, and accurate palmprint principal lines extraction method. Our approach consists of six simple steps: normalization, median filtering, average filters along four prefixed directions, grayscale bottom-hat filtering, combination of bottom-hat filtering, binarization and post processing. The contribution of our work is a new…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniEngineeringGround truthBiometricsbusiness.industryFeature extractionsegmentationNormalization (image processing)Palm line extractionImage processingPattern recognitionGrayscalePalmprint; Palm line extraction; segmentation; biometricbiometricMedian filterComputer visionSegmentationArtificial intelligencePalmprintbusiness
researchProduct

A Multimodal Technique for an Embedded Fingerprint Recognizer in Mobile Payment Systems

2009

The development and the diffusion of distributed systems, directly connected to recent communication technologies, move people towards the era of mobile and ubiquitous systems. Distributed systems make merchant-customer relationships closer and more flexible, using reliable e-commerce technologies. These systems and environments need many distributed access points, for the creation and management of secure identities and for the secure recognition of users. Traditionally, these access points can be made possible by a software system with a main central server. This work proposes the study and implementation of a multimodal technique, based on biometric information, for identity management a…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniMinutiaeAuthenticationUbiquitous authentication multimodal systems mobile payment systems biometric techniques and embedded systemsBiometricsComputer Networks and Communicationsbusiness.industryComputer scienceFingerprint (computing)Process (computing)TK5101-6720Identity managementComputer Science ApplicationsEmbedded systemTelecommunicationMobile paymentSoftware systembusinessComputer networkMobile Information Systems
researchProduct

Design and Implementation of an Efficient Fingerprint Features Extractor

2014

Biometric recognition systems are rapidly evolving technologies and their use in embedded devices for accessing and managing data and resources is a very challenging issue. Usually, they are composed of three main modules: Acquisition, Features Extraction and Matching. In this paper the hardware design and implementation of an efficient fingerprint features extractor for embedded devices is described. The proposed architecture, designed for different acquisition sensors, is composed of four blocks: Image Pre-processor, Macro-Features Extractor, Micro- Features Extractor and Master Controller. The Image Pre- processor block increases the quality level of the input raw image and performs an a…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniMinutiaeBiometricsComputer sciencebusiness.industryFingerprint (computing)Feature extractionFingerprint recognitionComputer visionArtificial intelligenceFPGA Fingerprint Features Extraction Adaptive ProcessingField-programmable gate arraybusinessImage resolutionBlock (data storage)2014 17th Euromicro Conference on Digital System Design
researchProduct

A User-Friendly Interface for Fingerprint Recognition Systems Based on Natural Language Processing

2009

Biometric recognition systems represent a valid solution to the safety problem of internet accessibility, even if they do not always provide an environment easily comprehensible by users and operators with a mid-level of competence. This gap can be partially filled if, instead of using the conventional access routines to the authentication system, the user could simply write to the system through the interface and using high level sentences and requests be able to use its own natural language to reach the intended goal. On the other hand, biometrics features are widely used for recognition and identification all over the world, generating large databases. In this paper a user-friendly inter…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniUser FriendlyBiometricsDatabaseHuman-Computer Interaction Biometric Recognition Natural Language Processingbusiness.industryComputer scienceUsabilityFingerprint recognitioncomputer.software_genreHuman–computer interactionThe InternetMessage authentication codeUser interfacebusinesscomputerNatural language2009 International Conference on Complex, Intelligent and Software Intensive Systems
researchProduct

Fingerprint and Iris based Authentication in Intercooperative Emerging e-Infrastructures

2013

E-infrastructures must support the development of heterogeneous applications for workstation network, for mobile and portable systems and devices. In this context and relating to all collaborative and pervasive computational technology a very important role is played by security and authentication systems, which represent the first step of the whole process. Biometric authentication systems represent a valid alternative to conventional authentication systems providing robust procedures for user authentication. On the other hand, Internet of Things involves a heterogeneous set of interacting devices to enable innovative global and local applications and services for users. In this chapter fi…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniUser authenticationAuthenticationBiometricsComputer sciencebusiness.industryFingerprint (computing)Context (language use)Biometric Authentication Systems Unimodal and Multimodal Systems Embedded SensorsSoftwareHuman–computer interactionAuthentication protocolEmbedded systemLightweight Extensible Authentication Protocolbusiness
researchProduct

Sparse Sampling and Maximum Likelihood Estimation for Boolean Models

1991

A condition for practical independence of contact distribution functions in Boolean models is obtained. This result allows the authors to use maximum likelihcod methods, via sparse sampling, for estimating unknown parameters of an isotropic Boolean model. The second part of this paper is devoted to a simulation study of the proposed method. AMS classification: 60D05

Statistics and ProbabilityBiometricsBoolean modelIsotropySampling (statistics)General MedicineLikelihood-ratio testStatisticsMaximum satisfiability problemStatistics Probability and UncertaintyAlgorithmIndependence (probability theory)Standard Boolean modelMathematicsBiometrical Journal
researchProduct

Improvements and Modifications of Tarone's Multiple Test Procedure for Discrete Data

1998

Tarone (1990, Biometrics 46, 515-522) proposed a multiple test procedure for discrete test statistics improving the usual Bonferroni procedure. However, Tarone's procedure is not monotone depending on the predetermined multiple level a. Roth (1998, Journal of Statistical Planning and Inference, in press) developed a monotone version of Tarone's procedure. We present a similar procedure that is both monotone and an improvement of Tarone's proposal. Based on this extension, we derive a step-down procedure that is a corresponding improvement of Holm's (1979, Scandinavian Journal of Statistics 6, 65-70) sequentially rejective procedure. It is shown how adjusted p-values can be computed for the …

Statistics and ProbabilityGeneral Immunology and MicrobiologyBiometricsComputer scienceTest proceduresApplied MathematicsInferenceGeneral MedicineExtension (predicate logic)General Biochemistry Genetics and Molecular Biologysymbols.namesakeBonferroni correctionMonotone polygonsymbolsGeneral Agricultural and Biological SciencesAlgorithmStatistical hypothesis testingBiometrics
researchProduct

Tests for Differentiation in Gene Expression Using a Data-Driven Order or Weights for Hypotheses

2005

In the analysis of gene expression by microarrays there are usually few subjects, but high-dimensional data. By means of techniques, such as the theory of spherical tests or with suitable permutation tests, it is possible to sort the endpoints or to give weights to them according to specific criteria determined by the data while controlling the multiple type I error rate. The procedures developed so far are based on a sequential analysis of weighted p-values (corresponding to the endpoints), including the most extreme situation of weighting leading to a complete order of p-values. When the data for the endpoints have approximately equal variances, these procedures show good power properties…

Statistics and ProbabilityModels StatisticalModels GeneticBiometricsGene Expression ProfilingWord error rateFamilywise error rateGeneral MedicineData-drivenWeightingData Interpretation StatisticalsortComputer Simulationp-valueStatistics Probability and UncertaintyAlgorithmAlgorithmsOligonucleotide Array Sequence AnalysisMathematicsType I and type II errorsBiometrical Journal
researchProduct

<title>Face modeling: a real-time embedded implementation of a stereovision algorithm</title>

2001

The problem to acquire 3D data of human face can be applied in face recognition, virtual reality, and many other applications. It can be solved using stereovision. This technique consistes in acquiring data in three dimensions from two cameras. The aim is to implement an algorithmic chain which makes it possible to obtain a three-dimensional space from two two-dimensional spaces: two images coming from the two cameras. Several implementations have already been considered. We propose a new simple realtime implementation, based on a multiprocessor approach (FPGA-DSP) allowing to consider an embedded processing. Then we show our method which provides depth map of face, dense and reliable, and …

StereopsisBiometricsbusiness.industryComputer scienceDepth mapFace (geometry)Pattern recognition (psychology)Computer visionArtificial intelligenceVirtual realitybusinessMetaverseFacial recognition systemSPIE Proceedings
researchProduct

An affordable contactless security system access for restricted area

2016

International audience; We present in this paper a security system based on identity verification process and a low-cost smart camera , intended to avoid unauthorized access to restricted area. The Le2i laboratory has a longstanding experience in smart cameras implementation and design [1], for example in the case of real-time classical face detection [2] or human fall detection [3]. The principle of the system, fully thought and designed in our laboratory, is as follows: the allowed user presents a RFID card to the reader based on Odalid system [4]. The card ID, time and date of authorized access are checked using connection to an online server. In the same time, multi-modality identity ve…

Support Vector MachineReal-time Image ProcessingBiometricsSmart CameraFace VerificationEigenFacesFace Detection[INFO.INFO-ES]Computer Science [cs]/Embedded Systems[ INFO.INFO-ES ] Computer Science [cs]/Embedded Systems[INFO.INFO-ES] Computer Science [cs]/Embedded Systems
researchProduct