Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
Spoofing is the act of masquerading as a valid user by falsifying data to gain an illegitimate access. Vulnerability of recognition systems to spoofing attacks (presentation attacks) is still an open security issue in biometrics domain and among all biomet ...
Digital images, taken for example with a smartphone, are usually geo-tagged with location and viewing direction information. This information is not always accurate due to, for example, GPS inaccuracies in large cities. The aim of this project is to develo ...
The vulnerability of finger vein recognition to spoofing is studied in this paper. A collection of spoofing finger vein images has been created from real finger vein samples. Finger vein images are printed using a commercial printer and then, presented at ...
It is important in biometric person recognition systems to protect personal data and privacy of users. This paper introduces a new mechanism to revoke and protect fingerprint minutiae information, which can be used in today’s security-aware society. The re ...
Biometric recognition using the palm vein characteristics is emerging as a touchless and spoof-resistant hand-based means to identify individuals or to verify their identity. One of the open challenges in this field is the creation of fast and modality-dep ...
Poor quality of fingerprint data is one of the major problems concerning latent fingerprint matching in forensic applications. Local quality of fingerprint plays a very important role in this application field to ensure high recognition performance. Al- th ...
With biometrics playing the role of a password which can not be replaced if stolen, the necessity of establishing counter- measures to biometric spoofing attacks has been recognized. Regardless of the biometric mode, the typical approach of anti-spoofing s ...
This study examines session variability modelling for face authentication using Gaussian mixture models. Session variability modelling aims to explicitly model and suppress detrimental within-class (inter-session) variation. The authors examine two techniq ...
This paper examines session variability modelling for face authentication using Gaussian mixture models. Session variability modelling aims to explicitly model and suppress detrimental within-class (inter-session) variation. We examine two techniques to do ...
Finger vein recognition is a recent biometric application, which relies on the use of human finger vein patterns beneath the skin's surface. While several methods have been proposed in the literature, its applicability to uncontrolled scenarios has not yet ...