首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15篇
  免费   0篇
化学   3篇
数学   1篇
物理学   11篇
  2022年   1篇
  2021年   2篇
  2020年   3篇
  2016年   1篇
  2015年   1篇
  2014年   1篇
  2009年   1篇
  2008年   2篇
  2007年   1篇
  2006年   1篇
  2001年   1篇
排序方式: 共有15条查询结果,搜索用时 15 毫秒
1.
苑玮琦  徐露  林忠华 《光学学报》2006,26(10):537-1542
目前的虹膜识别都是采用在图像上提取特征点,并将特征点编码为固定长度的特征数据用于匹配的方式。这种方式使虹膜识别系统易受攻击。为了进一步提高虹膜识别系统的安全性和识别速度,提出了一种基于灰度曲面匹配的虹膜识别方法。该方法抛弃了特征提取和编码等传统操作,在特征分析的基础上直接利用了灰度曲面匹配的思想,首先对两幅图像中的像素灰度做差,得到灰度差曲面,然后求出该灰度差曲面的方差。将此方差作为衡量两个虹膜特征曲面之间距离的依据,并据此判定两个虹膜是否来自同一只眼睛。在给定阈值为40的前提下,正确识别率为96.89%,识别时间为53.2 ms。实验结果证明,该方法识别准确率高,识别速度快。  相似文献   
2.
Automated border control systems are the first critical infrastructure point when crossing a border country. Crossing border lines for unauthorized passengers is a high security risk to any country. This paper presents a multispectral analysis of presentation attack detection for facial biometrics using the learned features from a convolutional neural network. Three sensors are considered to design and develop a new database that is composed of visible (VIS), near-infrared (NIR), and thermal images. Most studies are based on laboratory or ideal conditions-controlled environments. However, in a real scenario, a subject’s situation is completely modified due to diverse physiological conditions, such as stress, temperature changes, sweating, and increased blood pressure. For this reason, the added value of this study is that this database was acquired in situ. The attacks considered were printed, masked, and displayed images. In addition, five classifiers were used to detect the presentation attack. Note that thermal sensors provide better performance than other solutions. The results present better outputs when all sensors are used together, regardless of whether classifier or feature-level fusion is considered. Finally, classifiers such as KNN or SVM show high performance and low computational level.  相似文献   
3.
Geometrical methods of feature extraction from ear images in order to perform human identification are presented. Geometrical approach is motivated by the actual procedures used by police and forensic experts (so-called ear otoscopy). In their work, geometrical features of ears such as size, height, width, and shapes of earlobe are useful and valid proofs of identity. The contribution of the article is development of the new and original methods of geometrical feature extraction from 2D ear images. Four novel algorithms of ear feature extraction from contour images are described in detail. Moreover, identification results obtained for each of the methods, based on the distance of feature vectors in the feature space, are presented.  相似文献   
4.
It is known that a variant of Ising model, called Seeded Ising Model, can be used to recover the information content of a biometric template from a fraction of information therein. The method consists in reconstructing the whole template, which is called the intruder template in this paper, using only a small portion of the given template, a partial template. This reconstruction method may pose a security threat to the integrity of a biometric identity management system. In this paper, based on the Seeded Ising Model, we present a systematic analysis of the possible security breach and its probability of accepting the intruder templates as genuine. Detailed statistical experiments on the intruder match rate are also conducted under various scenarios. In particular, we study (1) how best a template is divided into several small pieces called partial templates, each of which is to be stored in a separate silo; (2) how to do the matching by comparing partial templates in the locked-up silos, and letting only the results of these intra-silo comparisons be sent to the central tallying server for final scoring without requiring the whole templates in one location at any time.  相似文献   
5.
A multivariate insight into the in vitro antitumour screen database of the NCI by means of the SIMCA package allows to propose hypotheses on the mechanism of action of novel anticancer compounds. As an example, the application of multivariate analysis to the NCI standard database provided clues to the classification of drugs whose mechanism is either unknown or controversial. Moreover, the influence of intrinsic biochemical cell line properties (molecular targets) on the sensitivity to drug treatment could be evaluated simultaneously for classes of compounds which act by the same mechanism. Interestingly, the present approach can also provide a correlation between the molecular targets and the therapeutical fingerprint of novel active compounds thus suggesting specific biochemical studies for the investigation of new mechanisms of drug action and resistance. The statistical approach reported here represents a valuable tool for handling theenormous data sets deriving from recent genome-wide investigations of gene expression in the NCI cell lines.  相似文献   
6.
The security of information is necessary for the success of any system. So, there is a need to have a robust mechanism to ensure the verification of any person before allowing him to access the stored data. So, for purposes of increasing the security level and privacy of users against attacks, cancelable biometrics can be utilized. The principal objective of cancelable biometrics is to generate new distorted biometric templates to be stored in biometric databases instead of the original ones. This paper presents effective methods based on different discrete transforms, such as Discrete Fourier Transform (DFT), Fractional Fourier Transform (FrFT), Discrete Cosine Transform (DCT), and Discrete Wavelet Transform (DWT), in addition to matrix rotation to generate cancelable biometric templates, in order to meet revocability and prevent the restoration of the original templates from the generated cancelable ones. Rotated versions of the images are generated in either spatial or transform domains and added together to eliminate the ability to recover the original biometric templates. The cancelability performance is evaluated and tested through extensive simulation results for all proposed methods on a different face and fingerprint datasets. Low Equal Error Rate (EER) values with high AROC values reflect the efficiency of the proposed methods, especially those dependent on DCT and DFrFT. Moreover, a comparative study is performed to evaluate the proposed method with all transformations to select the best one from the security perspective. Furthermore, a comparative analysis is carried out to test the performance of the proposed schemes with the existing schemes. The obtained outcomes reveal the efficiency of the proposed cancelable biometric schemes by introducing an average AROC of 0.998, EER of 0.0023, FAR of 0.008, and FRR of 0.003.  相似文献   
7.
8.
Today, we can read human genomes and store digital data robustly in synthetic DNA. Herein, we report a strategy to intertwine these two technologies to enable the secure storage of valuable information in synthetic DNA, protected with personalized keys. We show that genetic short tandem repeats (STRs) contain sufficient entropy to generate strong encryption keys, and that only one technology, DNA sequencing, is required to simultaneously read the key and the data. Using this approach, we experimentally generated 80 bit strong keys from human DNA, and used such a key to encrypt 17 kB of digital information stored in synthetic DNA. Finally, the decrypted information was recovered perfectly from a single massively parallel sequencing run.  相似文献   
9.
介绍了现在最有发展前景的生物特征识别技术——虹膜身份识别技术。在整体介绍了其技术的基础上,详细介绍了当今具有代表性的虹膜识别算法,最后针对虹膜识别技术存在的主要问题分析了虹膜识别的发展方向:精度高、速度快、鲁棒性好的定位算法,高效的特征提取方法,机器学习的分类方法,虹膜图像的质量评价,不完整、不合作情况下的虹膜识别以及活体虹膜检测。  相似文献   
10.
苑玮琦  徐露  林忠华 《光学学报》2007,27(11):2047-2053
由于虹膜自身的稳定性、非侵犯性、不可更改性等优点,虹膜识别已经成为生物特征身份鉴别领域中的研究热点。但虹膜丰富的纹理和复杂的结构给特征提取和编码带来了很大困难。为尽可能地简化特征提取和编码方法,提高虹膜识别效率,提出了一种基于局部信息统计的虹膜分块编码方法。对原始人眼图像进行虹膜定位等预处理操作,得到归一化的虹膜纹理图像;分别根据虹膜局部信息与全局信息、局部信息与局部信息之间的比较关系进行分块编码;计算了不同虹膜代码之间的汉明(Hamming)距离。根据汉明距离给出识别结果。实验证明该方法有效、可行,具有较高的识别率和识别速度。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号