Chimeric users have recently been proposed in the field of biometric person authentication as a way to overcome the problem of lack of real multimodal biometric databases as well as an important privacy issue – the fact that too many biometric modalities of a same person stored in a single location can present a higher risk of identity theft. While the privacy problem is indeed solved using chimeric users, it is still an open question of how such chimeric database can be efficiently used. For instance, the following two questions arise: i) Is the performance measured on a chimeric database a good predictor of that measured on a real-user database?, and, ii) can a chimeric database be exploited to improve the generalization performance of a ...
vi, viii, 95 leaves : ill. (some col.) ; 30 cm.PolyU Library Call No.: [THS] LG51 .H577M EIE 2005 Ch...
Abstract. Several papers have already shown the interest of using multiple classifiers in order to e...
Abstract. User verification systems that use a single biometric indicator often have to contend with...
Chimeric users have recently been proposed in the field of biometric person authentication as a way ...
Chimeric users have recently been proposed in the field of biometric person authentication as a way ...
Abstract. Combining multiple information sources, typically from several data streams is a very prom...
Person authentication is the process of confirming or determining a person's identity. Its purpose i...
Abstract. Combining multiple information sources, typically from several data streams is a very prom...
Biometric identity verification refers to technologies used to measure human physical or behavioral ...
Abstract. In this paper, an experimental comparison between fixed and trained fusion rules for multi...
Biometric computer authentication has an advantage over password and access card authentication in t...
Fusing the scores of several biometric systems is a very promising approach to improve the overall s...
AbstractThis paper presents a simulation study for a fusion or combiner algorithm for an ensemble cl...
Multi-modal person identity authentication is gaining more and more attention in the biometrics area...
Several papers have already shown the interest of using multiple classifiers in order to enhance the...
vi, viii, 95 leaves : ill. (some col.) ; 30 cm.PolyU Library Call No.: [THS] LG51 .H577M EIE 2005 Ch...
Abstract. Several papers have already shown the interest of using multiple classifiers in order to e...
Abstract. User verification systems that use a single biometric indicator often have to contend with...
Chimeric users have recently been proposed in the field of biometric person authentication as a way ...
Chimeric users have recently been proposed in the field of biometric person authentication as a way ...
Abstract. Combining multiple information sources, typically from several data streams is a very prom...
Person authentication is the process of confirming or determining a person's identity. Its purpose i...
Abstract. Combining multiple information sources, typically from several data streams is a very prom...
Biometric identity verification refers to technologies used to measure human physical or behavioral ...
Abstract. In this paper, an experimental comparison between fixed and trained fusion rules for multi...
Biometric computer authentication has an advantage over password and access card authentication in t...
Fusing the scores of several biometric systems is a very promising approach to improve the overall s...
AbstractThis paper presents a simulation study for a fusion or combiner algorithm for an ensemble cl...
Multi-modal person identity authentication is gaining more and more attention in the biometrics area...
Several papers have already shown the interest of using multiple classifiers in order to enhance the...
vi, viii, 95 leaves : ill. (some col.) ; 30 cm.PolyU Library Call No.: [THS] LG51 .H577M EIE 2005 Ch...
Abstract. Several papers have already shown the interest of using multiple classifiers in order to e...
Abstract. User verification systems that use a single biometric indicator often have to contend with...