This paper presents a robust algorithm for ear identification based on geometrical features of the ear and Kohnen Self Organization Maps (SOM). Using ears in identifying people has been interesting at least 100 years. The researches still discuss if the ears are unique or unique enough to be used as biometrics. Ear shape applications are not commonly used, yet, but the area is interesting especially in crime investigation. In this paper we present the basics of using ear as biometric for person identification and authentication. High resolution ear images are taken by high resolution digital camera. Six images have been taken for twenty three persons. Four geometrical distances were calculated for each image. These geometrical distanc...
People have become more interested in biometrics recognition as technology has advanced. Biometrics ...
Biometric authentication for personal identification is very popular now a days. Human ear recognit...
Biometrics is a critical component of cybersecurity that identifies persons by verifying their behav...
This document provides an approach to biometrics analysis which consists in the location and identif...
Abstract: Using ears in identifying people has been interesting at least 100 years. The researches s...
Identifying the people by using their ear is the emerging trend in the modern era. Biometrics deals ...
This paper offers an approach to biometric analysis using ears for recognition. The ear has all the ...
In this paper, a method to recognize human using ear biometrics has been proposed. Traditional image...
Biometrics is a critical component of cybersecurity that identifies persons by verifying their behav...
A number of researchers have shown that ear recognition is a viable alternative to more common biome...
Biometrics identification methods proved to be very efficient, more natural and easy for users than ...
Abstract — Biometrics identification methods have proved to be very efficient, more natural and easy...
AbstractThe biometrics recognition has been paid more attention by people with the advancement of te...
People have become more interested in biometrics recognition as technology has advanced. Biometrics ...
Generally, it is observed that face is the most feature dense region in human body. The natural way ...
People have become more interested in biometrics recognition as technology has advanced. Biometrics ...
Biometric authentication for personal identification is very popular now a days. Human ear recognit...
Biometrics is a critical component of cybersecurity that identifies persons by verifying their behav...
This document provides an approach to biometrics analysis which consists in the location and identif...
Abstract: Using ears in identifying people has been interesting at least 100 years. The researches s...
Identifying the people by using their ear is the emerging trend in the modern era. Biometrics deals ...
This paper offers an approach to biometric analysis using ears for recognition. The ear has all the ...
In this paper, a method to recognize human using ear biometrics has been proposed. Traditional image...
Biometrics is a critical component of cybersecurity that identifies persons by verifying their behav...
A number of researchers have shown that ear recognition is a viable alternative to more common biome...
Biometrics identification methods proved to be very efficient, more natural and easy for users than ...
Abstract — Biometrics identification methods have proved to be very efficient, more natural and easy...
AbstractThe biometrics recognition has been paid more attention by people with the advancement of te...
People have become more interested in biometrics recognition as technology has advanced. Biometrics ...
Generally, it is observed that face is the most feature dense region in human body. The natural way ...
People have become more interested in biometrics recognition as technology has advanced. Biometrics ...
Biometric authentication for personal identification is very popular now a days. Human ear recognit...
Biometrics is a critical component of cybersecurity that identifies persons by verifying their behav...