Learn More
This paper presents an overview of a state-of-the-art text-independent speaker verification system. First, an introduction proposes a modular scheme of the training and test phases of a speaker verification system. Then, the most commonly speech parameteriza-tion used in speaker verification, namely, cepstral analysis, is detailed. Gaussian mixture(More)
The baseline copus of a new multimodal database, acquired in the framework of the FP6 EU BioSec Integrated Project, is presented. The corpus consist of fingerprint images acquired with three different sensors, frontal face images from a webcam, iris images from an iris sensor, and voice utterances acquired both with a close-talk headset and a distant webcam(More)
In this contribution, the vulnerabilities of iris-based recognition systems to direct attacks are studied. A database of fake iris images has been created from real iris of the BioSec baseline database. Iris images are printed using a commercial printer and then, presented at the iris sensor. We use for our experiments a publicly available iris recognition(More)
A new liveness detection scheme for iris based on quality related measures is presented. The novel anti-spoofing technique is tested on a database comprising over 1,600 real and fake (high quality printed images) iris samples proving to have a very high potential as an effective protection scheme against direct attacks. Furthermore, the liveness detection(More)
In most cases authors are permitted to post their version of the article (e.g. in Word or Tex form) to their personal website or institutional repository. Authors requiring further information regarding Elsevier's archiving and manuscript policies are encouraged to visit: a b s t r a c t A new software-based liveness detection approach using a novel(More)
Score normalization methods in biometric verification, which encompass the more traditional user-dependent decision thresholding techniques, are reviewed from a test hypotheses point of view. These are classified into test dependent and target dependent methods. The focus of the paper is on target dependent methods, which are further classified into(More)
In this paper, we present the main results of the BioSecure Signature Evaluation Campaign (BSEC'2009). The objective of BSEC'2009 was to evaluate different online signature algorithms on two tasks: the first one aims at studying the influence of acquisition conditions (digitizing tablet or PDA) on systems' performance; the second one aims at studying the(More)
[*] Real world conditions differ from ideal or laboratory conditions, causing mismatch between training and testing phases, and consequently, inducing performance degradation in automatic speaker recognition systems [1]. Many strategies have been adopted to cope with acoustical degradation; in some applications of speaker identification systems a clean(More)
Speaker Recognition is a major task when security applications through speech input are needed. Regarding speaker identity, several factors of variability must be considered: a) Factors concerning peculiar intra-speaker variability (manner of speaking, inter-session variability, dialectal variations, emotional condition, etc.) or forced intra-speaker(More)
The security of biometric data is a very important issue in the deployment of biometric-based recognition systems. In this paper, we propose a signature-based biometric au-thentication system, where signal processing techniques are applied to the acquired on-line signature in order to generate protected templates, from which retrieving the original data is(More)