標(biāo)題: Titlebook: Biometric Security and Privacy; Opportunities & Chal Richard Jiang,Somaya Al-maadeed,Azeddine Beghdadi Book 2017 Springer International Pub [打印本頁(yè)] 作者: breath-focus 時(shí)間: 2025-3-21 19:48
書目名稱Biometric Security and Privacy影響因子(影響力)
書目名稱Biometric Security and Privacy影響因子(影響力)學(xué)科排名
書目名稱Biometric Security and Privacy網(wǎng)絡(luò)公開度
書目名稱Biometric Security and Privacy網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Biometric Security and Privacy被引頻次
書目名稱Biometric Security and Privacy被引頻次學(xué)科排名
書目名稱Biometric Security and Privacy年度引用
書目名稱Biometric Security and Privacy年度引用學(xué)科排名
書目名稱Biometric Security and Privacy讀者反饋
書目名稱Biometric Security and Privacy讀者反饋學(xué)科排名
作者: Arboreal 時(shí)間: 2025-3-21 20:45 作者: 紋章 時(shí)間: 2025-3-22 00:51
Improving Biometric Identification Performance Using PCANet Deep Learning and Multispectral Palmpriical or behavioral characteristic that the person possesses. In the last few years, several works in the field of biometrics got to improve the identification system performance rather than the traditional methods. So far, with the pace of rapid evolution in these works, new biometric modality (palm作者: 星球的光亮度 時(shí)間: 2025-3-22 08:32
Biometric Acoustic Ear Recognition,he many aspects within acoustic ear recognition, and based on the most influential ones, make attempts on deducing well performing recognition systems. Fifty subjects have participated in experiments collecting biometric samples. The measuring device composed of a pair of headphones with an integrat作者: Expiration 時(shí)間: 2025-3-22 12:28 作者: FANG 時(shí)間: 2025-3-22 16:58
Improved Model-Free Gait Recognition Based on Human Body Part, various intra-class variations such as clothing variations, carrying conditions, and angle variations that adversely affect the recognition performance. This chapter proposes a method to select the most discriminative human body part based on group Lasso of motion to reduce the intra-class variatio作者: 黃瓜 時(shí)間: 2025-3-22 19:19
Smartphone User Authentication Using Touch Dynamics in the Big Data Era: Challenges and Opportuniting a touchscreen. Thus, more research studies started focusing on touch dynamics and its applications on user authentication. Generally, touch dynamics can be described as the characteristics of the inputs received from a touchscreen when a user is interacting with a device (e.g., a touchscreen mobi作者: Rankle 時(shí)間: 2025-3-23 00:22 作者: POWER 時(shí)間: 2025-3-23 05:16 作者: aerial 時(shí)間: 2025-3-23 08:25
Non-cooperative and Occluded Person Identification Using Periocular Region with Visible, Infra-Red,se occlusions may be unintentional due to the use of different items such as head gear, headphone, head scarf, or may also be caused by the style of clothing or just hair style. Intentional facial occlusions occur when a particular person try to hide his identity by hiding his face and appearance fr作者: 一夫一妻制 時(shí)間: 2025-3-23 10:32
Robust Face Recognition Using Kernel Collaborative Representation and Multi-scale Local Binary Pattvery good and robust recognition rates. One of the modern approaches that make full use of the collaboration among classes in defining the query sample is Collaborative Representation with regularized least square (CRC-RLS). But, it uses the image intensity features to represent the template and que作者: Homocystinuria 時(shí)間: 2025-3-23 13:56
Recognition of 3D Faces with Missing Parts Based on SIFT and LBP Methods,culties further to propose and test a novel solution of 3D face recognition that is significantly capable to perform the recognition subject, in cases where the analysis of only a part of the face. With the proposed approach, the distinctive features of the face are captured by first extracting SIFT作者: 碎片 時(shí)間: 2025-3-23 19:43
Face Anti-spoofing in Biometric Systems,oposed to determine whether there is a live person or an artificial replica in front of the camera of face recognition system. Yet, developing efficient protection methods against this threat has proven to be a challenging task. In this chapter, we present a comprehensive overview of the state-of-th作者: 外科醫(yī)生 時(shí)間: 2025-3-23 23:35 作者: UTTER 時(shí)間: 2025-3-24 04:23
A Survey on Cyber Security Evolution and Threats: Biometric Authentication Solutions,ese issues, its evolution and the various solutions provided by the researchers; it also surveys the biometric solutions to one of the key issues of cybersecurity which is the intrusion, by providing robust authentication solutions basing on the unique physical and behavioural characteristics of the作者: malapropism 時(shí)間: 2025-3-24 07:17 作者: FLIC 時(shí)間: 2025-3-24 11:56 作者: Encoding 時(shí)間: 2025-3-24 16:49
Signal Processing for Security Technologieshttp://image.papertrans.cn/b/image/188181.jpg作者: 圓桶 時(shí)間: 2025-3-24 19:41
Biometric Security and Privacy978-3-319-47301-7Series ISSN 2510-1498 Series E-ISSN 2510-1501 作者: 巧辦法 時(shí)間: 2025-3-25 02:13
Fitriana Ferhadija,Bernadette Kushartantiese issues, its evolution and the various solutions provided by the researchers; it also surveys the biometric solutions to one of the key issues of cybersecurity which is the intrusion, by providing robust authentication solutions basing on the unique physical and behavioural characteristics of the user.作者: 語(yǔ)源學(xué) 時(shí)間: 2025-3-25 03:40
Language Policy in the Soviet Unionh work, different FQA solutions proposed so far are compared by using several quality metrics selected from the existing studies. The relationship between the quality metric and the matching performance is specifically analyzed via such a comparison and an extra discussion based on the sample utilit作者: 祖先 時(shí)間: 2025-3-25 11:34
Language Policy in the Soviet Unioning or even exceeding well-established biometric methods. Parameters such as universality, permanence, degree of acceptance, or collectability place vein pattern recognition in the top echelon of biometric methods and still, the technology has not gained the traction heralded in the beginning. The n作者: 異端邪說(shuō)2 時(shí)間: 2025-3-25 14:50
An Overview of Soviet Language Policy,ical or behavioral characteristic that the person possesses. In the last few years, several works in the field of biometrics got to improve the identification system performance rather than the traditional methods. So far, with the pace of rapid evolution in these works, new biometric modality (palm作者: Obliterate 時(shí)間: 2025-3-25 18:05
https://doi.org/10.1007/0-306-48083-2he many aspects within acoustic ear recognition, and based on the most influential ones, make attempts on deducing well performing recognition systems. Fifty subjects have participated in experiments collecting biometric samples. The measuring device composed of a pair of headphones with an integrat作者: 外形 時(shí)間: 2025-3-25 23:50
https://doi.org/10.1007/0-306-48083-2ed. For this purpose, raw Electro-Encephalo-Gram (EEG) signals were recorded from 40 volunteers while performing the task of eye blinking. These signals were recorded using portable EEG headset, known as Neurosky Mindwave, which has wireless and dry electrodes at Fp1 position above the left eye. Thi作者: Incumbent 時(shí)間: 2025-3-26 02:34 作者: 畫布 時(shí)間: 2025-3-26 08:10
https://doi.org/10.1007/0-306-48083-2ng a touchscreen. Thus, more research studies started focusing on touch dynamics and its applications on user authentication. Generally, touch dynamics can be described as the characteristics of the inputs received from a touchscreen when a user is interacting with a device (e.g., a touchscreen mobi作者: CRUMB 時(shí)間: 2025-3-26 10:06
The Slavic Republics and Moldova,ality. A secure connected health solution for human identification is presented in this chapter. The recognition of patients uses ECG biometric data streaming while the ECG signals are encrypted and decrypted using the advanced encryption standard (AES). Three different ECG databases representing 23作者: 敵手 時(shí)間: 2025-3-26 12:59 作者: cutlery 時(shí)間: 2025-3-26 17:01 作者: 無(wú)法取消 時(shí)間: 2025-3-26 23:41
Superpower Linguistic Competition in Cuba,very good and robust recognition rates. One of the modern approaches that make full use of the collaboration among classes in defining the query sample is Collaborative Representation with regularized least square (CRC-RLS). But, it uses the image intensity features to represent the template and que作者: intolerance 時(shí)間: 2025-3-27 04:24 作者: Dna262 時(shí)間: 2025-3-27 06:08 作者: 自制 時(shí)間: 2025-3-27 09:56
Puspita Andiani,Totok Suhardijanto arises due to storage and misuse of biometric data in various applications. This chapter systematically reviews the published literature on Biometric Template Protection (BTP) during 2005–2016 and covers the methods described in more than hundred articles. It aims to present the current status of B作者: 秘密會(huì)議 時(shí)間: 2025-3-27 14:47 作者: occult 時(shí)間: 2025-3-27 21:26
Lisnawaty Simatupang,Abdul Muta’aliotection of personal data. It tried to reach equilibrium between the protection of fundamental rights of the individuals and the demands of security, justice and economy. However, the rapid technological developments experienced since then brought to surface a completely different state of affairs. 作者: 優(yōu)雅 時(shí)間: 2025-3-28 00:17
https://doi.org/10.1007/978-3-319-47301-7Deep Learning; Nonlinear Graph Embedding; Ensemble Learning; Biometrics And Privacy And Security; Biomet作者: Osmosis 時(shí)間: 2025-3-28 05:52
978-3-319-83703-1Springer International Publishing Switzerland 2017作者: 木質(zhì) 時(shí)間: 2025-3-28 10:15
A Survey on Cyber Security Evolution and Threats: Biometric Authentication Solutions,ese issues, its evolution and the various solutions provided by the researchers; it also surveys the biometric solutions to one of the key issues of cybersecurity which is the intrusion, by providing robust authentication solutions basing on the unique physical and behavioural characteristics of the user.作者: 秘傳 時(shí)間: 2025-3-28 10:41
A Novel Perspective on Hand Vein Patterns for Biometric Recognition: Problems, Challenges, and Implntains a combination of novel research and analysis/discussion regarding the state of hand vein pattern recognition, its challenges, and potential modern approaches for mitigating the inherent problems of the technology. Closing remarks attempt to picture a possible future roadmap for vein pattern r作者: 奇思怪想 時(shí)間: 2025-3-28 14:51
Improving Biometric Identification Performance Using PCANet Deep Learning and Multispectral Palmpriresearchers are focused on methods used to extract the majorities of the characteristics that can discriminate each modality, which can decrease the intra-class variability and increase the inter-class variability. In this context and with the growing interest in biometrics applications, the studies作者: Frequency-Range 時(shí)間: 2025-3-28 20:17 作者: Small-Intestine 時(shí)間: 2025-3-29 00:45 作者: Blemish 時(shí)間: 2025-3-29 06:46
Offline Biometric Signature Verification Using Geometric and Colour Features,ng random forests, logistic regression and generalised linear models. The results are reported on the datasets of several competitions, including ICDAR 2009, ICFHR 2010, ICDAR 2011 and ICFHR 2012 signature verification competitions. The proposed method generally outperforms the other participating m作者: 獸皮 時(shí)間: 2025-3-29 09:30 作者: hypnotic 時(shí)間: 2025-3-29 14:37 作者: 彎曲道理 時(shí)間: 2025-3-29 17:22
Face Anti-spoofing in Biometric Systems,enging spoofing database exhibited excellent results. In particular, in inter-database evaluation, the proposed approach showed very promising generalization capabilities. We hope this case study stimulates the development of generalized face liveness detection. Lastly, we point out some of the pote作者: 不透明性 時(shí)間: 2025-3-29 21:23 作者: 蛛絲 時(shí)間: 2025-3-30 01:39 作者: 散步 時(shí)間: 2025-3-30 05:59 作者: 泥土謙卑 時(shí)間: 2025-3-30 08:37
https://doi.org/10.1007/0-306-48083-2egative pulses of the eye blinking waveform are employed as features. Finally, Discriminant Analysis (DA) classifier is used for classification. Moreover, a feature selection technique based on differential evolution is added for the proposed system. The best Correct Recognition Rate (CRR) achieved 作者: 激勵(lì) 時(shí)間: 2025-3-30 13:19 作者: 放大 時(shí)間: 2025-3-30 20:16 作者: nonradioactive 時(shí)間: 2025-3-30 21:06
The Slavic Republics and Moldova,le spectrum, near IR range, and also by using the hyperspectral image cubes in a relatively wider bandwidth. While most of the existing techniques for periocular recognition from videos have handpicked a single best frame from videos, we formulate periocular region based person identification in vid作者: 狂熱文化 時(shí)間: 2025-3-31 03:20
Superpower Linguistic Competition in Cuba, employed with CRC-RLS to handle problems associated with face recognition such as illumination, occlusion, disguise, etc. In addition, a kernel version of CRC-RLS is also proposed. The efficacy of our proposed KCRC-RLS is evaluated on four challenging image databases, i.e., AR, Extended Yale B, FER作者: FUSC 時(shí)間: 2025-3-31 06:51
Editia Herningtias,Bernadette Kushartantienging spoofing database exhibited excellent results. In particular, in inter-database evaluation, the proposed approach showed very promising generalization capabilities. We hope this case study stimulates the development of generalized face liveness detection. Lastly, we point out some of the pote作者: 鋪?zhàn)?nbsp; 時(shí)間: 2025-3-31 09:26 作者: cunning 時(shí)間: 2025-3-31 13:29
2510-1498 ning;.Addresses new challenges arising from big data, low-qu.This book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches, and ensemble learning. Included are special biometric technologies related to privacy and sec作者: FLAGR 時(shí)間: 2025-3-31 19:20 作者: Irrepressible 時(shí)間: 2025-4-1 01:13
Lisnawaty Simatupang,Abdul Muta’alijustice and economy. However, the rapid technological developments experienced since then brought to surface a completely different state of affairs. The aim of this chapter is to appraise the significance of the new legislative path taken by the European Union insofar biometric data is concerned.作者: 變態(tài) 時(shí)間: 2025-4-1 01:57
Biometric Acoustic Ear Recognition,. Fifty subjects have participated in experiments collecting biometric samples. The measuring device composed of a pair of headphones with an integrated microphone as sensor. Several methods have been utilized for feature extraction, including principal component analysis, and various types of distance metrics and classifiers have been employed.作者: output 時(shí)間: 2025-4-1 09:47
Data Protection and Biometric Data: European Union Legislation,justice and economy. However, the rapid technological developments experienced since then brought to surface a completely different state of affairs. The aim of this chapter is to appraise the significance of the new legislative path taken by the European Union insofar biometric data is concerned.作者: 清楚說(shuō)話 時(shí)間: 2025-4-1 12:10
Language Policy in the Soviet Unionn so as to improve the recognition performance. The proposed method is evaluated using CASIA gait database (dataset B), and the experimental results suggest that our method yields 88.75?% of Correct Classification Rate (CCR) when compared to existing state-of-the-art methods.作者: sacrum 時(shí)間: 2025-4-1 16:55