Massimo Tistarelli

Learn More
Several pattern recognition and classification techniques have been applied to the biometrics domain. Among them, an interesting technique is the Scale Invariant Feature Transform (SIFT), originally devised for object recognition. Even if SIFT features have emerged as a very powerful image descriptors, their employment in face analysis context has never(More)
The estimation of time to impact is of vital importance for animals as well as for autonomous robots. The optical ow, which is the two-dimensional projection on the retinal plane of the relative, three-dimensional motion between the observer and the objects in the scene can be used to estimate the time to impact. In this paper the application of an(More)
This paper describes an improved version of the MCC fingerprint matching approach. An in-depth error analysis allowed us to point out the weakest points of the original MCC and to design: i) a more effective minutiae pair selection and ii) a more distortion-tolerant relaxation. The parameters of the new version have been tuned over a new larger dataset and(More)
A new multimodal biometric database designed and acquired within the framework of the European BioSecure Network of Excellence is presented. It is comprised of more than 600 individuals acquired simultaneously in three scenarios: 1 over the Internet, 2 in an office environment with desktop PC, and 3 in indoor/outdoor environments with mobile portable(More)
The aim of this paper is to study the fusion at feature extraction level for face and fingerprint biometrics. The proposed approach is based on the fusion of the two traits by extracting independent feature pointsets from the two modalities, and making the two pointsets compatible for concatenation. Moreover, to handle the 'problem of curse of(More)
This paper presents a new face identification system based on graph matching technique on SIFT features extracted from face images. Although SIFT features have been successfully used for general object detection and recognition, only recently they were applied to face recognition. This paper further investigates the performance of identification techniques(More)
In recent years face recognition systems have been applied in various useful applications, such as surveillance, access control, criminal investigations, law enforcement, and others. However face biometric systems can be highly vulnerable to spoofing attacks where an impostor tries to bypass the face recognition system using a photo or video sequence. In(More)