Logo - springer
Slogan - springer

Computer Science - Image Processing | Biometric Authentication - First International Conference, ICBA 2004, Hong Kong, China, July 15-17,

Biometric Authentication

First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004, Proceedings

Zhang, David Y., Jain, Anil (Eds.)

2004, XVIII, 810 p.

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 
$149.00

(net) price for USA

ISBN 978-3-540-25948-0

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase


learn more about Springer eBooks

add to marked items

Softcover
Information

Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$189.00

(net) price for USA

ISBN 978-3-540-22146-3

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

The past decade has seen a rapid growth in the demand for biometric-based - thentication solutions for a number of applications. With signi?cant advances in biometrictechnologyandanincreaseinthenumberofapplicationsincorporating biometrics, it is essential that we bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions for the development and successful deployment of state-of-the-art biometric systems. The InternationalConference onBiometric Authentication (ICBA 2004)was the ?rst major gathering in the Asia-Paci?c region devoted to facilitating this interaction. We are pleased that this conference attracted a large number of high-quality research papers that will bene?t the international biometrics - search community. After a careful review of 157 submissions, 101 papers were acceptedeitherasoral(35)orposter(66)presentations.Inadditiontothesete- nical presentations, this conference also presented the results and summaries of threebiometric competitions: FingerprintVeri?cationCompetition (FVC 2004), Face Authentication Competition (FAC 2004), and Signature Veri?cation C- petition (SVC 2004). This conference provided a forum for the practitioners to discuss their practical experiences in applying the state-of-the-art biometric technologies which will further stimulate research in biometrics. We aregrateful to Jim L. Wayman, Edwin Rood, Raymond Wong, Jonathon Philips,andFrancisHoforacceptingourinvitationtogivekeynotetalksatICBA 2004. In addition, we would like to express our gratitude to all the contributors, reviewers, program committee and organizing committee members who made this a very successful conference. We also wish to acknowledge the Croucher Foundation, the International Association of Pattern Recognition, IEEE Hong Kong Section, the Hong Kong Polytechnic University, the National Natural S- ence Foundation in China, and Springer-Verlag for sponsoring this conference.

Content Level » Research

Keywords » Performance - Triangulation - biometric authentication - biometric systems - biometric technology - biometrics - data security - face recognition - fingerprint - fingerprint matching - fingerprint recognition - handwriting recognition - identity - optimization - security

Related subjects » General Issues - Image Processing - Information Systems and Applications - Software Engineering

Table of contents 

Fingerprint Verification Competition 2004.- FVC2004: Third Fingerprint Verification Competition.- Face Authentication Competition 2004.- Face Authentication Competition on the BANCA Database.- Signature Verification Competition 2004.- SVC2004: First International Signature Verification Competition.- Face.- Watch List Face Surveillance Using Transductive Inference.- Matching 2.5D Scans for Face Recognition.- Constructing SVM Multiple Tree for Face Membership Authentication.- A Combination of Shape and Texture Classifiers for a Face Verification System.- Enhance the Alignment Accuracy of Active Shape Models Using Elastic Graph Matching.- Reconstruction of High-Resolution Facial Image Using Recursive Error Back-Projection.- Biometrics of Asymmetrical Face.- Face Authentication from Cell Phone Camera Images with Illumination and Temporal Variations.- Facial Expression Recognition Based on Dimension Model of Emotion with Autonomously Extracted Sparse Representations.- Hallucinating Face by Eigentransformation with Distortion Reduction.- An Optimal Subspace Analysis for Face Recognition.- A Still-to-Video Face Verification System Using Advanced Correlation Filters.- What Can I Tell from Your Face?.- An Integrated Dual Factor Authenticator Based on the Face Data and Tokenised Random Number.- A New Enhanced Nearest Feature Space (ENFS) Classifier for Gabor Wavelets Features-Based Face Recognition.- A Two-Stage Dimensional Reduction Approach to Low-Dimensional Representation of Facial Images.- Face Recognition with 3D Model-Based Synthesis.- ICA Based Face Recognition Robust to Partial Occlusions and Local Distortions.- One-Pass Incremental Membership Authentication by Face Classification.- Face Recognition Using Asymmetric Faces.- Performance versus Computational Complexity Trade-Off in Face Verification.- An Application of Fractal Image-Set Coding in Facial Recognition.- Corrupted Face Image Authentication Based on Noise Model.- Eigenspace-Based Face Hashing.- Point to Point Calibration Method of Structured Light for Facial Data Reconstruction.- Biometrics Person Authentication Using Projection-Based Face Recognition System in Verification Scenario.- Extraction of Glasses in Human Face Images.- Ant Colony Optimization for Feature Selection in Face Recognition.- Face Recognition from Color Images in Presence of Dynamic Orientations and Illumination Conditions.- Dynamic Local Feature Analysis for Face Recognition.- Fingerprint.- A Fingerprint Matching Using Minutiae Triangulation.- Estimating Fingerprint Deformation.- Comparison of Classification Methods for Time-Series Detection of Perspiration as a Liveness Test in Fingerprint Devices.- On Optimal Estimate of Directional Maps for Fingerprint Images.- Fingerprint Reference Point Detection.- Direct Gray-Scale Minutiae Extraction.- Improving Fingerprint Recognition Based on Crease Detection.- Image-Based Approach to Fingerprint Acceptability Assessment.- Reducing Silicon Fingerprint Sensor Area.- Externalized Fingerprint Matching.- A Robust Fingerprint Minutiae Matching Algorithm Based on the Support Model.- Fingerprint Classification: An Approach Based on Singularities and Analysis of Fingerprint Structure.- Characteristics of the Identification Algorithm Using a Matching Score Matrix.- Fingerprint Matching Integrating the Global Orientation Field with Minutia.- A Systematic Approach for Feature Extraction in Fingerprint Images.- Fingerprint Minutiae Matching with Orientation and Ridge.- A Hierarchy Approach for Singular Point Detection in Fingerprint Images.- Compensatory Algorithm for Fingerprint Recognition.- A Hierarchical Hough Transform for Fingerprint Matching.- Fingerprint Alignment Using Line Segments.- Private Fingerprint Verification without Local Storage.- Multi-unit Biometric Fusion in Fingerprint Verification.- Fast Separable Gabor Filter for Fingerprint Enhancement.- Iris.- A Real-Time Focusing Algorithm for Iris Recognition Camera.- Improving Iris Recognition Accuracy via Cascaded Classifiers.- Iris Recognition for Palm-Top Application.- Using Multi-matching System Based on a Simplified Deformable Model of the Human Iris for Iris Recognition.- An Iris Recognition Algorithm Using Local Extreme Points.- Multi-unit Iris Recognition System by Image Check Algorithm.- Iris Based Human Verification Algorithms.- Individual Recognition Based on Human Iris Using Fractal Dimension Approach.- Iris Recognition in Wearable Computer.- Iris Recognition Based on Location of Key Points.- Iris Identification Using Wavelet Packet for Images in Visible Light Illumination.- Signature.- Target Dependent Score Normalization Techniques and Their Application to Signature Verification.- Skilled Forgery Detection in On-Line Signatures: A Multimodal Approach.- Writer Identification Using Dynamic Features.- Searching for an Optimal Reference System for On-Line Signature Verification Based on (x, y) Alignment.- Reduction of Feature Statistics Estimation Error for Small Training Sample Size in Off-Line Signature Verification.- Biometric Personal Authentication Based on Handwritten Signals.- On-Line Signature Verification Based on PCA (Principal Component Analysis) and MCA (Minor Component Analysis).- Biometric User Authentication on Smart Cards by Means of Handwritten Signatures.- Writer Identification Method Based on Forensic Knowledge.- A Window-Based Hybrid Signature Verification System.- On-Line Signature Verification by Explicit Solution to the Point Correspondence Problem.- New Features for Authentication by On-Line Handwritten Signatures.- On-Line Signature Verification Based on Discrete Wavelet Domain Adaptive Signal Processing.- Speech.- Speaker Modeling with Various Speech Representations.- Using Otoacoustic Emissions as a Biometric.- A Pruning Approach for GMM-Based Speaker Verification in Mobile Embedded Systems.- Speaker Identification Using Higher Order Spectral Phase Features and their Effectiveness vis–a–vis Mel-Cepstral Features.- High Performance Speaker Verification System Based on Multilayer Perceptrons and Real-Time Enrollment.- Spectral Subband Centroids as Complementary Features for Speaker Authentication.- Maximum Likelihood and Maximum a Posteriori Adaptation for Distributed Speaker Recognition Systems.- Fuzzy Normalisation Methods for Pattern Verification.- Biometric Fusion and Risk Analysis.- A Hyperbolic Function Model for Multiple Biometrics Decision Fusion.- Combining Fingerprint and Voiceprint Biometrics for Identity Verification: an Experimental Comparison.- An Evolutionary Algorithm Based Approach for Dynamic Thresholding in Multimodal Biometrics.- Fusion of Auxiliary Information for Multi-modal Biometrics Authentication.- Decision Fusion for Face Authentication.- User Authentication through Typing Biometrics Features.- When Faces Are Combined with Palmprints: A Novel Biometric Fusion Strategy.- Biometric User Authentication for Heightened Information Security.- BioEVA: An Evaluation Tool for Biometric Algorithms.- Application of Multi-criteria Analysis for the Creation of a Risk Assessment Knowledgebase for Biometric Systems.- Other Biometrics.- Soft Biometric Traits for Personal Recognition Systems.- A New Approach to Personal Identification in Large Databases by Hierarchical Palmprint Coding with Multi-features.- Watermarking of MPEG-4 Videos.- Hand Recognition Using Geometric Classifiers.- Feature-Level Fusion for Effective Palmprint Authentication.- A Palmprint Acquisition Device with Time-Sharing Light Source Used in Personal Verification.- HMMs Based Palmprint Identification.- Personal Identification and Verification: Fusion of Palmprint Representations.- Towards an Automated Dental Identification System (ADIS).

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Pattern Recognition.