PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

A note on Töeplitz matrix-based model in biometrics

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
This paper presents a summary of the work presented as an invited paper at MIT 2008 International Conference. The work comprises a general note on the problems we meet in our everyday contact with biometrics and their different systems. A particular attention is paid to the anti-spoofing approaches in having a safe and convenient system of human verification for personal identification. A conclusion is drawn that neither stand-alone nor multi-system Biometrics are ideal and convenient to people for their daily necessity of being identified. The author suggests a system that may seem practical in banks and cash machines, for example, in which a biometric system is used (fingerprint or face identification for example) in conjunction with the popular means of account securing, the PIN code.
Twórcy
autor
  • Faculty of Computer Science, Bialystok Technical University, Wiejska 45A, 15-351 Bialystok, Poland
Bibliografia
  • [1] SAEED K. (Editor-in-Chief), NISHIUCHI N., YAMAGUCHI T. (Guest Editors), International Journal of Biometrics (IJBM), Special Issue on Spoofing Issues and Anti-Spoofing, Vol. 1, No. 2, 2008.
  • [2] ROSS A., KULKARNI Y., JAIN A., Handbook of Multibiometrics, Springer Verlag, 2006.
  • [3] HONG L. , KULKARNI Y., ROSS A., JAIN A., Multibiometrics - Integrating Faces and Fingerprints for Personal Identification. http://biometrics.cse.msu.edu/multi_bio.html , September 2008.
  • [4] PARA T., PORWIK P., WRÓBEL K., On-line signature recognition method based on Linear Regression, Journal of Medical Informatics and Technologies, vol. 11, Medical Informatics and Technologies : 12th International Conf., Osieczany, pp. 97-103, 2007.
  • [5] SAEED K., ADAMSKI M., Experimental Algorithm for Characteristic Points Evaluation in Static Images of Signatures, Biometrics, Computer Security Systems and Artificial Intelligence, Springer, New York, pp. 89-98, 2006.
  • [6] KHOLMATOV A., YANIKOGLU B., Identity authentication using improved online signature verification method, Pattern Recognition Letters, Vol. 26, No. 15, pp. 2400-2408, November 2005.
  • [7] JAIN A. K., PANKANTI S., A Touch of Money, IEEE Spectrum, vol. 43, no.7, pp. 14-19, July 2006.
  • [8] GRENANDER U., SZEGÖ G., Toeplitz Forms and Their Applications," University of California Press, 1959
  • [9] SAEED, K.: Image Analysis for Object Recognition. Bialystok Technical University Press, Bialystok, Poland, 2004.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-PWA4-0006-0003
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.