Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
In this paper, several approaches that can be used to improve biometric authentication applications are proposed. The idea is inspired by the ensemble approach, i.e., the use of several classifiers to solve a problem. Compared to using only one classifier, ...
In this paper, several approaches that can be used to improve biometric authentication applications are proposed. The idea is inspired by the ensemble approach, i.e., the use of several classifiers to solve a problem. Compared to using only one classifier, ...
In some applications, contacts between two devices are the first cause of dysfunctions. The aim of this paper is to transfer contactless power energy to add new functions to a tool (e.g., drill machine). A bidirectional communication is also needed. This i ...
With the development of object identification technology object tagging becomes more and more common. In this work we analyze how recycling processes can benefit from deployment of passive RFID tags and discuss how spreading small electronic chips in the e ...
In this study, two techniques that can improve the authentication process are examined: (i) multiple samples and (ii) multiple biometric sources. We propose the fusion of multiple samples obtained from multiple biometric sources at the score level. By usin ...
Multi-band, multi-stream and multi-modal approaches have proven to be very successful both in experiments and in real-life applications, among which speech recognition and biometric authentication are of particular interest here. However, there is a lack o ...
Multi-stream approaches have proven to be very successful in speech recognition tasks and to a certain extent in speaker authentication tasks. In this study we propose a noise-robust multi-stream text-independent speaker authentication system. This system ...
In this paper, several approaches that can be used to improve biometric authentication applications are proposed. The idea is inspired by the ensemble approach, i.e., the use of several classifiers to solve a problem. Compared to using only one classifier, ...
This document presents an overview on multimodal identity verification in the context of the BANCA project. In the first part, we detail multimodal identity verification and the methods used to create a system and to compute its performance. In the second ...
The development of plastic card printers has led to the widespread use of identity documents printed on plastic cards, such as ID cards, driving licenses and access key cards. This paper presents a new security feature based on a technique for embedding a ...