Results 221 to 230 of about 10,010 (275)
Monitoring and predicting cotton leaf diseases using deep learning approaches and mathematical models. [PDF]
Rehman A, Akhtar N, Alhazmi OH.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Liveness detection competition 2009
Biometric Technology Today, 2009The widespread use of personal verification systems based on fingerprints has shown some security weaknesses. Gian Luca Marcialis, assistant professor at the Department of electrical and electronic engineering in the University of Cagliari reports on the first international fingerprint liveness detection competition 2009 – LivDet 2009.
MARCIALIS G, ROLI F
openaire +1 more source
Live Facemask Detection System
2021{"references": ["Article \"Computer vision\" Available at: https://en.wikipedia.org/wiki/Computer_vision", "Web Article \"Advantages of Computer Vision\" Available at: https://www.kinali.cz/en/computer-vision/advantages-of-computer-vision/", "S. Feng, C. Shen, N. Xia, W. Song, M. Fan, B.J.
Nagoriya, Harsh, Mohak Parekh
openaire +1 more source
IEEE Pulse, 2020
Your phone scans your face to unlock its screen. A social media app offers suggestions of friends to tag in photos. Airline check-in systems verify who you are as you stare into a camera. These are just a few examples of how facial recognition technology (FRT) is now ubiquitous in everyday lives.
openaire +2 more sources
Your phone scans your face to unlock its screen. A social media app offers suggestions of friends to tag in photos. Airline check-in systems verify who you are as you stare into a camera. These are just a few examples of how facial recognition technology (FRT) is now ubiquitous in everyday lives.
openaire +2 more sources
2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), 2016
Biometric system is widely used to recognize the authorized person based on either behavioral characteristics or physical. But this can be spoofed using various traits. Spoofing attack is nothing but attacking or harming biometric recognition system using security features to use system without permission of authorized user. These biometric systems can
Dhananjay Garud, S.S. Agrwal
openaire +1 more source
Biometric system is widely used to recognize the authorized person based on either behavioral characteristics or physical. But this can be spoofed using various traits. Spoofing attack is nothing but attacking or harming biometric recognition system using security features to use system without permission of authorized user. These biometric systems can
Dhananjay Garud, S.S. Agrwal
openaire +1 more source
Biometrie liveness authentication detection
2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), 2017Increasing use of biometrie authentication systems in the recent years, spoof fingerprint and iris detection has become increasingly important. Biometrics is to discriminate subjects in a reliable manner for a target application based on one or more signals derived from physical or behavioral traits, such as fingerprint, face, iris, voice, palm, or ...
Sreejit Sundaran +2 more
openaire +1 more source
Liveness Detection in Biometrics
2015 International Conference of the Biometrics Special Interest Group (BIOSIG), 2015The use of biometrics as an alternative for PIN and password-based authentication systems becomes increasingly attractive in this day and age. Biometric systems perform an authentication by personal biological or behavioral characteristics. A negative side effect of the increasing use of biometric systems is the progressing development of sophisticated
Nils Rogmann, Maximilian Krieg
openaire +1 more source

