BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
base (26)
authent (19)
use (19)
system (12)
identif (11)

Stem biometr$ (all stems)

96 papers:

ITiCSEITiCSE-2015-MoralesF #authentication #case study #student
Keystroke Biometrics for Student Authentication: A Case Study (AM, JFA), p. 337.
FMFM-2015-BringerCML #architecture #design #privacy #reasoning
Privacy by Design in Practice: Reasoning about Privacy Properties of Biometric System Architectures (JB, HC, DLM, RL), pp. 90–107.
CHICHI-2015-BuschekLA #mobile #usability
Improving Accuracy, Applicability and Usability of Keystroke Biometrics on Mobile Touchscreen Devices (DB, ADL, FA), pp. 1393–1402.
CHICHI-2015-HolzBK #identification #mobile #named #using
Bodyprint: Biometric User Identification on Mobile Devices Using the Capacitive Touchscreen to Scan Body Parts (CH, SB, MK), pp. 3011–3014.
CHICHI-2015-LucaHZH #authentication #comprehension #exclamation #smarttech #towards
I Feel Like I’m Taking Selfies All Day!: Towards Understanding Biometric Authentication on Smartphones (ADL, AH, EvZ, HH), pp. 1411–1414.
SACSAC-2015-NascimentoBJ #approach #geometry #recognition
A new approach to biometric recognition based on hand geometry (MVPdN, LVB, NLCJ), pp. 59–65.
ICSEICSE-v2-2015-Muller #developer
Measuring Software Developers’ Perceived Difficulty with Biometric Sensors (SCM), pp. 887–890.
CHICHI-2014-BurgbacherH #gesture #type system #verification
An implicit author verification system for text messages based on gesture typing biometrics (UB, KHH), pp. 2951–2954.
ICPRICPR-2014-BicegoRFRG #behaviour #using
Behavioural Biometrics Using Electricity Load Profiles (MB, FR, AF, SDR, EG), pp. 1764–1769.
ICPRICPR-2014-ChenB #multi
Soft Biometrics Integrated Multi-target Tracking (XC, BB), pp. 4146–4151.
ICPRICPR-2014-Gomez-BarreroRGFB #adaptation
Protected Facial Biometric Templates Based on Local Gabor Patterns and Adaptive Bloom Filters (MGB, CR, JG, JF, CB), pp. 4483–4488.
ICPRICPR-2014-Gonzalez-SosaVFO #comparison #image #recognition #using
Comparison of Body Shape Descriptors for Biometric Recognition Using MMW Images (EGS, RVR, JF, JOG), pp. 124–129.
ICPRICPR-2014-IslamCK #case study #forensics #geometry
A Preliminary Study of Lower Leg Geometry as a Soft Biometric Trait for Forensic Investigation (MRI, FKSC, AWKK), pp. 427–431.
ICPRICPR-2014-KumarK #adaptation #multimodal #recognition #security #set #using
Adaptive Security for Human Surveillance Using Multimodal Open Set Biometric Recognition (AK, AK), pp. 405–410.
ICPRICPR-2014-YangD #identification #novel #using
Novel HHT-Based Features for Biometric Identification Using EEG Signals (SY, FD), pp. 1922–1927.
SACSAC-2014-YoonY #authentication #network #using
A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks (EJY, KYY), pp. 699–705.
ICDARICDAR-2013-KhanKS #identification #problem #question #verification
Can Signature Biometrics Address Both Identification and Verification Problems? (SHK, ZK, FS), pp. 981–985.
CHICHI-2013-CurmiFSW13a #named #network #social
HeartLink: open broadcast of live biometric data to social networks (FC, MAF, JS, JW), pp. 1749–1758.
CHICHI-2013-Mirza-BabaeiNGCF #game studies #how #research #testing
How does it play better?: exploring user testing and biometric storyboards in games user research (PMB, LEN, JG, NC, GF), pp. 1499–1508.
SACSAC-2013-AraujoGA #artificial reality #identification #towards #using
Towards skeleton biometric identification using the microsoft kinect sensor (RMA, GG, VA), pp. 21–26.
CHICHI-2012-Sae-BaeAIM #approach #authentication #gesture #multi #novel
Biometric-rich gestures: a novel approach to authentication on multi-touch devices (NSB, KA, KI, NDM), pp. 977–986.
ICPRICPR-2012-Gomez-BarreroGFOMF #authentication #case study #geometry
Inverse biometrics: A case study in hand geometry authentication (MGB, JG, JF, JOG, AM, MAF), pp. 1281–1284.
ICPRICPR-2012-HadidGKPBN #question
Can gait biometrics be Spoofed? (AH, MG, VK, MP, JDB, MSN), pp. 3280–3283.
ICPRICPR-2012-MaLWZH #authentication #multimodal #security
Enhancing biometric security with wavelet quantization watermarking based two-stage multimodal authentication (BM, CL, YW, ZZ, DH), pp. 2416–2419.
ICPRICPR-2012-PohKA #approach #authentication #parametricity
A discriminative parametric approach to video-based score-level fusion for biometric authentication (NP, JK, FMA), pp. 2335–2338.
ICPRICPR-2012-PollardSA #forensics #image
Print biometrics: Recovering forensic signatures from halftone images (SBP, SJS, GBA), pp. 1651–1654.
ICPRICPR-2012-RattaniMGR #approach #automation #classification
A dual-staged classification-selection approach for automated update of biometric templates (AR, GLM, EG, FR), pp. 2972–2975.
ICPRICPR-2012-StrucZP #normalisation #parametricity #verification
Non-parametric score normalization for biometric verification systems (VS, JZG, NP), pp. 2395–2399.
ICPRICPR-2012-TyagiKFSR #classification #identification
Fusing biographical and biometric classifiers for improved person identification (VT, HPK, TAF, LVS, NKR), pp. 2351–2354.
ICPRICPR-2012-YanoZL #authentication #multimodal
Multimodal biometric authentication based on iris pattern and pupil light reflex (VY, AZ, LLL), pp. 2857–2860.
MLDMMLDM-2012-HossainC #behaviour #identification
Combination of Physiological and Behavioral Biometric for Human Identification (EH, GC), pp. 380–393.
ICDARICDAR-2011-AtanasiuLV #novel #retrieval #using
Writer Retrieval — Exploration of a Novel Biometric Scenario Using Perceptual Features Derived from Script Orientation (VA, LLS, NV), pp. 628–632.
HCIDUXU-v1-2011-TambasciaDM #authentication #mobile #multimodal
Methodology for Evaluating Multimodal Biometric Authentication on Mobile Devices (CdAT, RED, EMDM), pp. 668–677.
HCIHCI-DDA-2011-LiangL #axiom #design
Axiomatic Design for Biometric Icons (SFML, CTL), pp. 98–106.
ECIRECIR-2010-KellyJ #independence #query #retrieval
Biometric Response as a Source of Query Independent Scoring in Lifelog Retrieval (LK, GJFJ), pp. 520–531.
ICPRICPR-2010-AdamsWDMBG #feature model #less is more #recognition
Genetic-Based Type II Feature Extraction for Periocular Biometric Recognition: Less is More (JA, DLW, GVD, PEM, KSB, GG), pp. 205–208.
ICPRICPR-2010-BasakKTR #approach #identification #multi
A Gradient Descent Approach for Multi-modal Biometric Identification (JB, KK, VT, NKR), pp. 1322–1325.
ICPRICPR-2010-ChiaSN #linear #multimodal #towards
Towards a Best Linear Combination for Multimodal Biometric Fusion (CC, NS, LN), pp. 1176–1179.
ICPRICPR-2010-GiotHR #2d #low cost #multimodal #recognition
Low Cost and Usable Multimodal Biometric System Based on Keystroke Dynamics and 2D Face Recognition (RG, BH, CR), pp. 1128–1131.
ICPRICPR-2010-GuoMR #database #performance #recognition #scalability #using
Cross-Age Face Recognition on a Very Large Database: The Performance versus Age Intervals and Improvement Using Soft Biometric Traits (GG, GM, KR), pp. 3392–3395.
ICPRICPR-2010-LiN #robust
Robust ECG Biometrics by Fusing Temporal and Cepstral Information (ML, SN), pp. 1326–1329.
ICPRICPR-2010-MakiharaHY #how #question
How to Control Acceptance Threshold for Biometric Signatures with Different Confidence Values? (YM, MAH, YY), pp. 1208–1211.
ICPRICPR-2010-MaLWZW #adaptation #authentication #multimodal
Block Pyramid Based Adaptive Quantization Watermarking for Multimodal Biometric Authentication (BM, CL, YW, ZZ, YW), pp. 1277–1280.
ICPRICPR-2010-OudaTN
Tokenless Cancelable Biometrics Scheme for Protecting Iris Codes (OO, NT, TN), pp. 882–885.
ICPRICPR-2010-PohKMMB #adaptation
Model and Score Adaptation for Biometric Systems: Coping With Device Interoperability and Changing Acquisition Conditions (NP, JK, SM, DM, JFB), pp. 1229–1232.
ICPRICPR-2010-RathgebU10a #database #generative
Iris-Biometric Hash Generation for Biometric Database Indexing (CR, AU), pp. 2848–2851.
ICPRICPR-2010-SutcuSM #how #question
How to Measure Biometric Information? (YS, HTS, NDM), pp. 1469–1472.
ICPRICPR-2010-Tabassi #fault #image #metric #performance
Image Specific Error Rate: A Biometric Performance Metric (ET), pp. 1124–1127.
ICPRICPR-2010-VenkateshJ #using
Human Electrocardiogram for Biometrics Using DTW and FLDA (NV, SJ), pp. 3838–3841.
ICPRICPR-2010-WoodardPMJR #on the
On the Fusion of Periocular and Iris Biometrics in Non-ideal Imagery (DLW, SJP, PEM, RRJ, AR), pp. 201–204.
SACSAC-2010-ChartonLLB #framework #named #open source
Mistral: open source biometric platform (EC, AL, CL, JFB), pp. 1503–1504.
HPDCHPDC-2010-BuiWHWFT #empirical #quality #scalability #towards
Towards long term data quality in a large scale biometrics experiment (HB, DW, CH, RW, PJF, DT), pp. 565–572.
ICDARICDAR-2009-MuramatsuYM #authentication #online #using
Biometric Person Authentication Method Using Camera-Based Online Signature Acquisition (DM, KY, TM), pp. 46–50.
HCIHIMI-II-2009-KukulaP #interactive #performance
Human-Biometric Sensor Interaction: Impact of Training on Biometric System and User Performance (EPK, RWP), pp. 168–177.
HCIOCSC-2009-Phukan #usability
Measuring Usability via Biometrics (AP), pp. 101–107.
ICEISICEIS-HCI-2009-VinhasSOR #assessment #multi #realtime #towards
Dynamic Multimedia Environment based on Realtime user Emotion Assessment — Biometric User Data towards Affective Immersive Environments (VV, DCS, ECO, LPR), pp. 42–47.
ICEISICEIS-J-2009-PenteadoM #authentication #web
A Video-Based Biometric Authentication for e-Learning Web Applications (BEP, ANM), pp. 770–779.
MODELSMoDELS-2009-LloydJ #analysis #authentication #ml #security #using
Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
MODELSMoDELS-2009-LloydJ #analysis #authentication #ml #security #using
Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
ICPRICPR-2008-GamboaF #classification #nondeterminism #testing
Uncertainty based classification fusion — a soft-biometrics test case (HG, ALNF), pp. 1–4.
ICPRICPR-2008-LiYZHC
Score based biometric template selection (YL, JY, EZ, CH, HC), pp. 1–4.
ICPRICPR-2008-PohK #authentication #bound #fault #multimodal #on the #using
On using error bounds to optimize cost-sensitive multimodal biometric authentication (NP, JK), pp. 1–4.
ICPRICPR-2008-ThomasRCB #analysis #comparative
Comparative analysis of registration based and registration free methods for cancelable fingerprint biometrics (AOT, NKR, JHC, RMB), pp. 1–4.
ICPRICPR-2008-VajariaSK #multi #retrieval #using
Clip retrieval using multi-modal biometrics in meeting archives (HV, SS, RK), pp. 1–4.
ICPRICPR-2008-YanZ #correlation #multimodal #using
Multimodal biometrics fusion using Correlation Filter Bank (YY, YJZ), pp. 1–4.
CASECASE-2007-YeMY #2d #identification #metric
Information Measures for Biometric Identification via 2D Discrete Wavelet Transform (ZY, HM, YY), pp. 835–840.
ICDARICDAR-2007-RabasseGF #synthesis
A Method for the Synthesis of Dynamic Biometric Signature Data (CR, RMG, MCF), pp. 168–172.
HCIDHM-2007-KukulaED #interactive #performance
The Effects of Human Interaction on Biometric System Performance (EPK, SJE, VGD), pp. 904–914.
MLDMMLDM-2007-TronciGR #design #multi
Selection of Experts for the Design of Multiple Biometric Systems (RT, GG, FR), pp. 795–809.
CASECASE-2006-MiddletonWBCN #smarttech
A smart environment for biometric capture (LM, DKW, AIB, JNC, MSN), pp. 57–62.
ICEISICEIS-DISI-2006-Jain #how #question #recognition
Biometric Recognition: How Do I Know Who You Are? (AKJ), pp. 17–18.
ECIRECIR-2006-MooneySJS #information retrieval
Investigating Biometric Response for Information Retrieval Applications (CM, MS, GJFJ, AFS), pp. 570–574.
ICPRICPR-v3-2006-WangB06b #multimodal #performance #predict
Performance Prediction for Multimodal Biometrics (RW, BB), pp. 586–589.
ICPRICPR-v4-2006-ArifBV
A fusion methodology based on Dempster-Shafer evidence theory for two biometric applications (MA, TB, NV), pp. 590–593.
ICPRICPR-v4-2006-NagarC #design #fuzzy #symmetry #using
Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme (AN, SC), pp. 537–540.
ICPRICPR-v4-2006-NilssonRCJ #identification
Biometric Identification of Mice (KN, TSR, JC, CJ), pp. 465–468.
ICPRICPR-v4-2006-RathaCBC #case study
Cancelable Biometrics: A Case Study in Fingerprints (NKR, JHC, RMB, SC), pp. 370–373.
ICPRICPR-v4-2006-ShuD #multi #verification
Multi-Biometrics Fusion for Identity Verification (CS, XD), pp. 493–496.
ICPRICPR-v4-2006-ZhengLZ #encryption #generative #using
Cryptographic Key Generation from Biometric Data Using Lattice Mapping (GZ, WL, CZ), pp. 513–516.
DACDAC-2005-TiriHHLYSV #embedded #encryption
A side-channel leakage free coprocessor IC in 0.18µm CMOS for embedded AES-based cryptographic and biometric processing (KT, DDH, AH, BCL, SY, PS, IV), pp. 222–227.
ICPRICPR-v2-2004-JainPPHR #challenge #named
Biometrics: A Grand Challenge (AKJ, SP, SP, LH, AR), pp. 935–942.
ICPRICPR-v2-2004-ZhangKGST
Elastic Face, An Anatomy-Based Biometrics Beyond Visible Cue (YZ, SJK, DBG, SS, LVT), pp. 19–22.
ICPRICPR-v3-2004-SavvidesKK04a #recognition
Cancelable Biometric Filters for Face Recognition (MS, BVKVK, PKK), pp. 922–925.
ICPRICPR-v4-2004-FanL #image #using #verification
The Using of Thermal Images of Palm-dorsa Vein-patterns for Biometric Verification (KCF, CLL), pp. 450–453.
SACSAC-2004-WaldmannSE #authentication
Protected transmission of biometric user authentication data for oncard-matching (UW, DS, CE), pp. 425–430.
ICDARICDAR-2003-Fairhurst #authentication #documentation #future of #verification
Document Identity, Authentication and Ownership: The Future of Biometric Verification (MCF), p. 1108–?.
CHICHI-2003-CoventryAJ #interface #usability #verification
Usability and biometric verification at the ATM interface (LMC, ADA, GJ), pp. 153–160.
ICPRICPR-v1-2002-VictorBS #evaluation
An Evaluation of Face and Ear Biometrics (BV, KWB, SS), pp. 429–432.
ICPRICPR-v1-2002-VielhauerSM #online #statistics
Biometric Hash based on Statistical Features of Online Signatures (CV, RS, AM), pp. 123–126.
ICPRICPR-v4-2002-SugieK #recognition
Media-Integrated Biometric Person Recognition Based on the Dempster-Shafer Theory (YS, TK), pp. 381–384.
SACSAC-2002-BrommeKEK #algorithm #authentication #concept #framework #operating system #testing
A conceptual framework for testing biometric algorithms within operating systems’ authentication (AB, MK, OE, OK), pp. 273–280.
ICPRICPR-v2-2000-BollePR #authentication #evaluation
Evaluation Techniques for Biometrics-Based Authentication Systems (FRR) (RMB, SP, NKR), pp. 2831–2837.
ICPRICPR-v2-2000-BurgeB
Ear Biometrics in Computer Vision (MB, WB), pp. 2822–2826.
ICPRICPR-v2-2000-ZhuTW #identification
Biometric Personal Identification Based on Handwritin (YZ, TT, YW), pp. 2797–2800.
ICPRICPR-v2-2000-ZhuTW00a #identification
Biometric Personal Identification Based on Iris Patterns (YZ, TT, YW), pp. 2801–2804.
ICPRICPR-1998-ShuZ #implementation #verification
Palmprint verification: an implementation of biometric technology (WS, DZ), pp. 219–221.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.