Learn More
Spoofing identities using photographs is one of the most common techniques to attack 2-D face recognition systems. There seems to exist no comparative studies of different techniques using the same protocols and data. The motivation behind this competition is to compare the performance of different state-of-the-art algorithms on the same database using a(More)
ACKNOWLEDGEMENTS On the onset, i would like to express my gratitute to God who has given me the inspiration and the mental, physical and economical strength to undertake PhD studies. I am very thankful to Dr. Fabio Roli for being my supervisor. His constant inspiration, educational guidance and suggestions have been remarkable during this period of studies.(More)
In this paper, an experimental comparison between fixed and trained fusion rules for multimodal personal identity verification is reported. We focused on the behaviour of the considered fusion methods for ensembles of classifiers exhibiting significantly different performance, as this is one of the main characteristics of multimodal biometrics systems. The(More)
Acknowledgements It is a great pleasure to thank those people whose company I enjoyed in my lovely PhD journey. It is difficult to overstate my gratitude to my friend and Ph.D. supervisor, Prof. Giuliano Armano. During these three years, he gave me an opportunity to learn not only how to be a thinker but most importantly be a life lover. Working with him(More)
Dedicated to my parents, my sister, and my friends ii Acknowledgements I would like to thank those people that gave me the opportunity to work and enjoy during my PhD journey. This thesis would not have been possible without the support and the insights of my advisor, prof. Giuliano Armano. I'm pleased for the given chance to reach this point of my career.(More)
Spoofing identities using photographs is one of the most common techniques to attack 2-D face recognition systems. There seems to exist no comparative studies of different techniques using the same protocols and data. The motivation behind this competition is to compare the performance of different state-of-the-art algorithms on the same database using a(More)
  • 1