My Account Log in

1 option

2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS) : proceedings : Tampa, Florida, USA 23-26 September 2019 / Institute of Electrical and Electronics Engineers.

IEEE Xplore (IEEE/IET Electronic Library - IEL) Available online

View online
Format:
Book
Author/Creator:
Institute of Electrical and Electronics Engineers, author, issuing body.
Language:
English
Subjects (All):
Biometry--Congresses.
Biometry.
Physical Description:
1 online resource (43 pages) : illustrations
Other Title:
2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems
Place of Publication:
Pistacaway, New Jersey : IEEE, [2019]
Contents:
Make the Bag Disappear: Carrying Status-invariant Gait-based Human Age Estimation using Parallel Generative Adversarial Networks
Semantic-Aware Makeup Cleanser
A Genetic Algorithm Enabled Similarity-Based Attack on Cancellable Biometrics
Unconstrained Thermal Hand Segmentation
An End-to-End Convolutional Neural Network for ECG-Based Biometric Authentication
The Effect of Broad and Specific Demographic Homogeneity on the Imposter Distributions and False Match Rates in Face Recognition Algorithm Performance
Hybrid Dictionary Learning and Matching for Video-based Face Verification
Reliable Age and Gender Estimation from Face Images: Stating the Confidence of Model Predictions
Gaze-angle Impact on Iris Segmentation using CNNs
Rotation Invariant Finger Vein Recognition
User Profiling Using Sequential Mining Over Web Elements
Palmprint Recognition Using Realistic Animation Aided Data Augmentation
Effects of Postmortem Decomposition on Face Recognition
How to Save Your Face: a Facial Recognition Method Robust Against Image Reconstruction
Finger-Vein Template Protection based on Alignment-Free Hashing
Perception of Image Features in Post-Mortem Iris Recognition: Humans vs Machines
Cross-sensor iris recognition using adversarial strategy and sensor-specific information
Deep Learning-Based Feature Extraction in Iris Recognition: Use Existing Models, Fine-tune or Train From Scratch?
Securing CNN Model and Biometric Template using Blockchain
LC-DECAL: Label Consistent Deep Collaborative Learning for Face Recognition
Identity-Aware Deep Face Hallucination via Adversarial Face Verification
A-LINK: Recognizing Disguised Faces via Active Learning based Inter-Domain Knowledge
ThirdEye: Triplet Based Iris Recognition without Normalization
MobiFace: A Lightweight Deep Learning Face Recognition on Mobile Devices
Realistic Dreams: Cascaded Enhancement of GAN-generated Images with an Example in Face Morphing Attacks
Robust Subject-invariant Feature Learning for Ocular Biometrics in Visible Spectrum
Multi-task Learning for Detecting and Segmenting Manipulated Facial Images and Videos
Attribute-Guided Coupled GAN for Cross-Resolution Face Recognition
Zero-Shot Deep Hashing and Neural Network Based Error Correction for Face Template Protection
Smartphone Camera De-identification while Preserving Biometric Utility
Face Phylogeny Tree: Deducing Relationships Between Near-Duplicate Face Images Using Legendre Polynomials and Radial Basis Functions
Facial Attribute Classification: A Comprehensive Study and a Novel Mid-Level Fusion Classifier
MasterPrint Attack Resistance: A Maximum Cover Based Approach for Automatic Fingerprint Template Selection
Hierarchical Bloom Filter Framework for Security, Space-efficiency, and Rapid Query Handling in Biometric Systems
Subclass Contrastive Loss for Injured Face Recognition
Defending Against Adversarial Iris Examples UsingWavelet Decomposition
A Locality Sensitive Hashing Based Approach for Generating Cancelable Fingerprints Templates
On Learning Joint Multi-biometric Representations by Deep Fusion
IARPA Janus Benchmark Multi-Domain Face
Morton Filters for Iris Template Protection - An Incremental and Superior Approach Over Bloom Filters
CHIF: Convoluted Histogram Image Features for Detecting Silicone Mask based Face Presentation Attack
Biases in Fingerprint Recognition Systems: Where Are We At?
On the Generalization of Detecting Face Morphing Attacks as Anomalies: Novelty vs. Outlier Detection.
Notes:
Description based on publisher supplied metadata and other sources.
ISBN:
1-7281-1522-1

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account