作业 发表于 2025-3-21 19:42:43

书目名称Biometrics and ID Management影响因子(影响力)<br>        http://impactfactor.cn/if/?ISSN=BK0188191<br><br>        <br><br>书目名称Biometrics and ID Management影响因子(影响力)学科排名<br>        http://impactfactor.cn/ifr/?ISSN=BK0188191<br><br>        <br><br>书目名称Biometrics and ID Management网络公开度<br>        http://impactfactor.cn/at/?ISSN=BK0188191<br><br>        <br><br>书目名称Biometrics and ID Management网络公开度学科排名<br>        http://impactfactor.cn/atr/?ISSN=BK0188191<br><br>        <br><br>书目名称Biometrics and ID Management被引频次<br>        http://impactfactor.cn/tc/?ISSN=BK0188191<br><br>        <br><br>书目名称Biometrics and ID Management被引频次学科排名<br>        http://impactfactor.cn/tcr/?ISSN=BK0188191<br><br>        <br><br>书目名称Biometrics and ID Management年度引用<br>        http://impactfactor.cn/ii/?ISSN=BK0188191<br><br>        <br><br>书目名称Biometrics and ID Management年度引用学科排名<br>        http://impactfactor.cn/iir/?ISSN=BK0188191<br><br>        <br><br>书目名称Biometrics and ID Management读者反馈<br>        http://impactfactor.cn/5y/?ISSN=BK0188191<br><br>        <br><br>书目名称Biometrics and ID Management读者反馈学科排名<br>        http://impactfactor.cn/5yr/?ISSN=BK0188191<br><br>        <br><br>

MANIA 发表于 2025-3-21 21:17:52

http://reply.papertrans.cn/19/1882/188191/188191_2.png

Tdd526 发表于 2025-3-22 01:37:51

Attack against Robust Watermarking-Based Multimodal Biometric Recognition Systems biometric sample data. In case robust embedding is used as the sole means of security, tampering attacks can be mounted. The results of a corresponding attack against a multimodal iris recognition scheme show, that in this environment either semi-fragile watermarking or additional classical cryptog

摆动 发表于 2025-3-22 06:32:19

http://reply.papertrans.cn/19/1882/188191/188191_4.png

垫子 发表于 2025-3-22 09:56:22

Eigen-Model Projections for Protected On-line Signature Recognitionhe enrolled users, and directly affects the successful deployment of the system itself. In this paper we propose a protected on-line signature recognition system where the properties of Universal Background Models are exploited to provide a small dimensionality and a limited intra-class variability

Malleable 发表于 2025-3-22 16:41:53

http://reply.papertrans.cn/19/1882/188191/188191_6.png

fetter 发表于 2025-3-22 20:44:32

http://reply.papertrans.cn/19/1882/188191/188191_7.png

strdulate 发表于 2025-3-22 21:21:30

Hill-Climbing Attack Based on the Uphill Simplex Algorithm and Its Application to Signature Verifica matcher are used in this approach to adapt iteratively an initial estimate of the attacked template to the specificities of the client being attacked. The proposed attack is evaluated on a competitive feature-based signature verification system over both the MCYT and the BiosecurID databases (compr

桉树 发表于 2025-3-23 04:08:17

http://reply.papertrans.cn/19/1882/188191/188191_9.png

Dorsal 发表于 2025-3-23 09:03:15

Performance Evaluation in Open-Set Speaker Identificationolves first identifying the speaker model in the database that best matches the given test utterance, and then determining if the test utterance has actually been produced by the speaker associated with the best-matched model. Whilst, conventionally, the performance of each of these two sub-processe
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Biometrics and ID Management; COST 2101 European W Claus Vielhauer,Jana Dittmann,Michael C. Fairhurst Conference proceedings 2011 Springer