Ograniczanie wyników
Czasopisma help
Lata help
Autorzy help
Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Znaleziono wyników: 108
first rewind previous Strona / 6 next fast forward last
Wyszukiwano:
w słowach kluczowych:  biometrics
help Sortuj według:

help Ogranicz wyniki do:
1
100%
Metrology and Measurement Systems
EN Biometric identification systems, i.e. the systems that are able to recognize humans by analyzing their physiological or behavioral characteristics, have gained a lot of interest in recent years. They can be used to raise the security level in certain institutions or can be treated as a convenient r[...]
2
100%
Journal of Telecommunications and Information Technology
2011 nr 4 115-118
EN The iris biometrics is considered one of the most accurate and robust methods of the identity verification. The unique iris features of an individual can be presented in a compact binary form which can be easily compared with the reference template to confirm identity. However in contrast to passwor[...]
3
100%
Journal of Telecommunications and Information Technology
2010 nr 4 75-85
EN Since the notion of biometric template is not well defined, various concepts are used in biometrics practice. In this paper we present a systematic view on a family of template concepts based on the L1 or L2 dissimilarities. In particular, for sample vectors of independent components we find out how[...]
4
100%
Journal of Telecommunications and Information Technology
2010 nr 4 10-18
EN The paper proposes a new iris coding method based on Zak-Gabor wavelet packet transform. The essential component of the iris recognition methodology design is an effective adaptation of the transformation parameters that makes the coding sensitive to the frequencies characterizing ones eye. We thus [...]
5
100%
Journal of Telecommunications and Information Technology
2010 nr 4 5-9
EN Efficient and robust segmentation of iris images captured in the uncontrolled environments is one of the challenges of non-cooperative iris recognition systems. We address this problem by proposing a novel iris segmentation algorithm, which is suitable both for monochrome and color eye images. The m[...]
6
100%
Journal of Telecommunications and Information Technology
2010 nr 4 26-36
EN A consistent particle filtering-based framework for the purpose of parallel face tracking and recognition from video sequences is proposed. A novel approach to defining randomized, particle filtering-driven local face features for the purpose of recognition is proposed. The potential of cumulating c[...]
7
100%
Optica Applicata
2012 Vol. 42, nr 4 865--873
EN The article presents a person identification system, which may work with an identikit picture. The identikit picture (sketch) is often used in practice as an investigative tool to search for the perpetrators of an unknown identity. With a portrait of the perpetrator of a crime, one may identify the [...]
8
100%
Journal of Telecommunications and Information Technology
2015 nr 2 23--24
EN This article discusses the changes that are the result of entry the new personal ID card issued in Poland. The new document contains less information about the owner, i.e. height, eye color or signature, so that the risk of identity theft is signicantly greater.
9
100%
Computer Science
2017 Vol. 18 (2) 179--194
EN Over the past few years, a huge increase in the number of various computer vision applications can be observed. These are widely used in such areas as video surveillance, medical diagnostics, biometrics recognition, and the automotive and military industries. Most of these solutions take advantage o[...]
10
100%
Journal of Telecommunications and Information Technology
2010 nr 4 68-74
EN In this article authors present the concept of application of multiagent approach in modeling biometric authentication systems. After short introduction, we present a short primer to multiagent technology. Next, we depict current state of the art related to biometrics combined with multiagent approa[...]
11
100%
Schedae Informaticae
2015 Vol. 24 31--40
EN This work presents the step by step tutorial for how to use cross entropy clustering for the iris segmentation. We present the detailed construction of a suitable Gaussian model which best fits for in the case of iris images, and this is the novelty of the proposal approach. The obtained results are[...]
12
100%
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki
2017 Nr 4 168--179
EN Possibilities for the use of biometric data are growing and hence their practical application is also increasing. Therefore, an important element to be considered in the design, construction and exploitation of systems using biometrics is the question of identifying a specific person and assigning h[...]
13
100%
Optica Applicata
2018 Vol. 48, nr 1 149--160
EN Iris based authentication methods are popular due to their reliability and dependability. This paper proposes the method of the iris recognition that instead uses only two fragments of the pattern. The presented method allows for a simpler iris extraction, as it does not use a complex conversion of [...]
14
100%
Pomiary Automatyka Kontrola
PL Pomiary biometryczne mogą służyć do identyfikacji lub weryfikacji osób. W artykule, na przykładzie systemu biometrycznego rozpoznawania twarzy i rozpoznawania dłoni, przedstawiono ograniczenia występujące w pomiarach biometrycznych. W trybie identyfikacji wyznaczany jest wzorzec biometryczny, który [...]
EN Biometrics measurements can be applied to person`s identyfication or verification. In paper, using as example the biometric system recognising face and palm, some limitations existing in biometric measurements are discussed. In the identification case the system is trained with patterns of severan p[...]
15
100%
Computer Science
EN Biometric databases are important components that help improve the performanceof state-of-the-art recognition applications. The availability of more andmore challenging data is attracting the attention of researchers, who are systematicallydeveloping novel recognition algorithms and increasing the a[...]
16
100%
Information Systems in Management
2016 Vol. 5, No. 2 248--259
EN Soft biometrics methods that involve gender, age and ethnicity are still developed. Face recognition methods often rely on gender recognition. The same applies to the methods reconstructing the faces or building 2D or 3D models of the faces. In the paper, we conduct study on different set of gender [...]
17
100%
Opto - Electronics Review
EN The advantages of optical wavelet transform used as a preprocessor for an artificial neural network are investigated. We show by digital simulation that this set-up can successfully identify and discriminate complex biometric images, such as fingerprints. The achieved capabilities include limited sh[...]
18
88%
Control and Cybernetics
EN Ensuring safety requires the use of access control systems. Traditional systems typically use proximity cards. Modern systems use biometrics to identify the user. Using biological characteristics for identification ensures a high degree of safety. In addition, biological characteristics cannot be ne[...]
19
88%
Machine Graphics and Vision
EN A new approach to iris feature extraction using geometrical wavelets is presented. Iris code is generated by using representation of the wavelet coefficients based on a wedgelet dictionary. The accuracy of identification in the case of head inclination by a certain angle for different ranges of poss[...]
20
88%
Machine Graphics and Vision
EN With the increasing demand for enhanced security, iris biometrics-based personal identification has become an interesting research topic in the field of pattern recognition. While most state-of-the-art iris recognition algorithms are focused on preprocessing iris images, important new directions hav[...]
first rewind previous Strona / 6 next fast forward last