Biometric Authentication: First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004, Proceedings / Edition 1

Paperback (Print)
Buy New
Buy New from BN.com
$151.20
Used and New from Other Sellers
Used and New from Other Sellers
from $111.18
Usually ships in 1-2 business days
(Save 41%)
Other sellers (Paperback)
  • All (6) from $111.18   
  • New (3) from $139.51   
  • Used (3) from $111.18   

Overview

This book constitutes the refereed proceedings of the First International Conference on Biometric Authentication, ICBA 2004, held in Hong Kong, China in July 2004.

The 104 revised full papers presented were carefully reviewed and selected from 157 submissions; also included are summaries of 3 biometric competitions on fingerprint verification, face authentication, and signature verification. The papers are organized in topical sections on face, fingerprint, iris, signature, speech, biometric fusion and risk analysis, and other biometric issues.

Read More Show Less

Product Details

  • ISBN-13: 9783540221463
  • Publisher: Springer Berlin Heidelberg
  • Publication date: 11/10/2004
  • Series: Lecture Notes in Computer Science Series , #3072
  • Edition description: 2004
  • Edition number: 1
  • Pages: 810
  • Product dimensions: 6.10 (w) x 9.20 (h) x 1.00 (d)

Table of Contents

FVC 2004 : third fingerprint verification competition 1
Face authentication competition on the BANCA database
SVC 2004 : first international signature verification competition 16
Watch list face surveillance using transductive inference 23
Matching 2.5D scans for face recognition 30
Constructing SVM multiple tree for face membership authentication 37
A combination of shape and texture classifiers for a face verification system 44
Enhance the alignment accuracy of active shape models using elastic graph matching 52
Reconstruction of high-resolution facial image using recursive error back-projection 59
Biometrics of asymmetrical face 67
Face authentication from cell phone camera images with illumination and temporal variations 74
Facial expression recognition based on dimension model of emotion with autonomously extracted sparse representations 81
Hallucinating face by eigentransformation with distortion reduction 88
An optimal subspace analysis for face recognition 95
A still-to-video face verification system using advanced correlation filters 102
What can I tell from your face? 109
An integrated dual factor authenticator based on the face data and tokenised random number 117
A new enhanced nearest feature space (ENFS) classifier for gabor wavelets features-based face recognition 124
A two-stage dimensional reduction approach to low-dimensional representation of facial images 131
Face recognition with 3D model-based synthesis 139
ICA based face recognition robust to partial occlusions and local distortions 147
One-pass incremental membership authentication by face classification 155
Face recognition using asymmetric faces 162
Performance versus computational complexity trade-off in face verification 169
An application of fractal image-set coding in facial recognition 178
Corrupted face image authentication based on noise model 187
Eigenspace-based face hashing 195
Point to point calibration method of structured light for facial data reconstruction 200
Biometrics person authentication using projection-based face recognition system in verification scenario 207
Extraction of glasses in human face images 214
Ant colony optimization for feature selection in face recognition 221
Face recognition from color images in presence of dynamic orientations and illumination conditions 227
Dynamic local feature analysis for face recognition 234
A fingerprint matching using minutiae triangulation 241
Estimating fingerprint deformation 249
Comparison of classification methods for time-series detection of perspiration as a liveness test in fingerprint devices 256
On optimal estimate of directional maps for fingerprint images 264
Fingerprint reference point detection 272
Direct gray-scale minutiae extraction 280
Improving fingerprint recognition based on crease detection 287
Image-based approach to fingerprint acceptability assessment 294
Reducing silicon fingerprint sensor area 301
Externalized fingerprint matching 309
A robust fingerprint minutiae matching algorithm based on the support model 316
Fingerprint classification : an approach based on singularities and analysis of fingerprint structure 324
Characteristics of the identification algorithm using a matching score matrix 330
Fingerprint matching integrating the global orientation field with minutia 337
A systematic approach for feature extraction in fingerprint images 344
Fingerprint minutiae matching with orientation and ridge 351
A hierarchy approach for singular point detection in fingerprint images 359
Compensatory algorithm for fingerprint recognition 366
A hierarchical Hough transform for fingerprint matching 373
Fingerprint alignment using line segments 380
Private fingerprint verification without local storage 387
Multi-unit biometric fusion in fingerprint verification 395
Fast separable gabor filter for fingerprint enhancement 403
A real-time focusing algorithm for iris recognition camera 410
Improving iris recognition accuracy via cascaded classifiers 418
Iris recognition for palm-top application 426
Using multi-matching system based on a simplified deformable model of the human Iris for iris recognition 434
An iris recognition algorithm using local extreme points 442
Multi-unit iris recognition system by image check algorithm 450
Iris based human verification algorithms 458
Individual recognition based on human iris using fractal dimension approach 467
Iris recognition in wearable computer 475
Iris recognition based on location of key points 484
Iris identification using wavelet packet for images in visible light illumination 491
Target dependent score normalization techniques and their application to signature verification 498
Skilled forgery detection in on-line signatures : a multimodal approach 505
Writer identification using dynamic features 512
Searching for an optimal reference system for on-line signature verification based on (x, y) alignment 519
Reduction of feature statistics estimation error for small training sample size in off-line signature verification 526
Biometric personal authentication based on handwritten signals 533
On-line signature verification based on PCA (principal component analysis) and MCA (minor component analysis) 540
Biometric user authentication on smart cards by means of handwritten signatures 547
Writer identification method based on forensic knowledge 555
A window-based hybrid signature verification system 562
On-line signature verification by explicit solution to the point correspondence problem 569
New features for authentication by on-line handwritten signatures 577
On-line signature verification based on discrete wavelet domain adaptive signal processing 584
Speaker modeling with various speech representations 592
Using otoacoustic emissions as a biometric 600
A pruning approach for GMM-based speaker verification in mobile embedded systems 607
Speaker identification using higher order spectral phase features and their effectiveness vis-a-vis mel-cepstral features 614
High performance speaker verification system based on multilayer perceptrons and real-time enrollment 623
Spectral subband centroids as complementary features for speaker authentication 631
Maximum likelihood and maximum a posteriori adaptation for distributed speaker recognition systems 640
Fuzzy normalisation methods for pattern verification 648
A hyperbolic function model for multiple biometrics decision fusion 655
Combining fingerprint and voiceprint biometrics for identity verification : an experimental comparison 663
An evolutionary algorithm based approach for dynamic thresholding in multimodal biometrics 671
Fusion of auxiliary information for multi-modal biometrics authentication 678
Decision fusion for face authentication 686
User authentication through typing biometrics features 694
When faces are combined with palmprints : a novel biometric fusion strategy 701
Biometric user authentication for heightened information security 708
BioEVA : an evaluation tool for biometric algorithms 716
Application of multi-criteria analysis for the creation of a risk assessment knowledgebase for biometric systems 724
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)