• Publications
  • Influence
Comparative study of background subtraction algorithms
In this paper, we present a comparative study of several state of the art background subtraction methods. Approaches ranging from simple background subtraction with global thresholding to moreExpand
  • 282
  • 19
Review and evaluation of commonly-implemented background subtraction algorithms
Locating moving objects in a video sequence is the first step of many computer vision applications. Among the various motion-detection techniques, background subtraction methods are commonlyExpand
  • 340
  • 12
Unsupervised Performance Evaluation of Image Segmentation
We present in this paper a study of unsupervised evaluation criteria that enable the quantification of the quality of an image segmentation result. These evaluation criteria compute some statisticsExpand
  • 120
  • 11
Abnormal events detection based on spatio-temporal co-occurences
We explore a location based approach for behavior modeling and abnormality detection. In contrast to the conventional object based approach where an object may first be tagged, identified,Expand
  • 157
  • 7
Keystroke dynamics with low constraints SVM based passphrase enrollment
Keystroke dynamics biometric systems have been studied for more than twenty years. They are very well perceived by users, they may be one of the cheapest biometric system (as no specific material isExpand
  • 76
  • 6
Genetic fusion: application to multi-components image segmentation
In this communication, we propose a new approach which enables to fusion either the results of several segmentation methods of a same image or the different results in the case of a multi-componentsExpand
  • 59
  • 5
Secure payment with NFC mobile phone in the SmartTouch project
This paper deals with the ITEA (Information Technology for European Advancement) SmartTouch project whose one of the objectives is to use NFC mobile phones for a secure payment. An experience in realExpand
  • 67
  • 5
GREYC keystroke: A benchmark for keystroke dynamics biometric systems
Even if the market penetration rate of biometric technologies is still far below its potential, many biometric systems are used in our daily real-life. One of the main reasons to its lowExpand
  • 160
  • 4
Unconstrained keystroke dynamics authentication with shared secret
Among all the existing biometric modalities, authentication systems based on keystroke dynamics present interesting advantages. These solutions are well accepted by users and cheap as no additionalExpand
  • 83
  • 4
Unsupervised clustering method with optimal estimation of the number of clusters: application to image segmentation
We propose in this communication an unsupervised clustering method called MLBG based upon the K-means algorithm. The originality of this method lies in the automatic determination of the number ofExpand
  • 82
  • 4