Learn More
— This paper describes an algorithm for still image compression called B-tree triangular coding (BTTC). The coding scheme is based on the recursive decomposition of the image domain into right-angled triangles arranged in a binary tree. The method is attractive because of its fast encoding, O(n log n), and decoding, 2(n), where n is the number of pixels,(More)
Government agencies are investing a considerable amount of resources into improving security systems as result of recent terrorist events that dangerously exposed flaws and weaknesses in today's safety mechanisms. Badge or password-based authentication procedures are too easy to hack. Biometrics represents a valid alternative but they suffer of drawbacks as(More)
Iannarelli's studies showed that ear shape can be considered a biometric identifier able to authenticate people as well as more established biometrics like face or voice, for instance. However, very few researches can be found in literature about ear recognition. In most cases techniques already working in other biometric fields, such as PCA (Principal(More)
Fractals can be an effective approach for several applications other than image coding and transmission: database indexing, texture mapping, and even pattern recognition problems such as writer authentication. However, fractal-based algorithms are strongly asymmetric because, in spite of the linearity of the decoding phase, the coding process is much more(More)
a r t i c l e i n f o Mobile devices, namely phones and tablets, have long gone " smart ". Their growing use is both a cause and an effect of their technological advancement. Among the others, their increasing ability to store and exchange sensitive information, has caused interest in exploiting their vulnerabilities, and the opposite need to protect users(More)
Iannarelli's studies demonstrated that ear shape represents a biometric identifier able to authenticate people in the same way as more established biometrics, like face or voice for instance. However, not many researches can be found in literature about ear recognition. In most cases existing algorithms are borrowed from other biometric contexts. An example(More)
In this chapter, the authors discuss the main outcomes from both the most recent literature and the research activities summarized in this book. Of course, a complete review is not possible. It is evident that each issue related to face recognition in adverse conditions can be considered as a research topic in itself and would deserve a detailed survey of(More)
Face recognition in real-world applications is often hindered by uncontrolled settings including pose, expression, and illumination changes, and/or ageing. Additional challenges related to changes in facial appearance due to plastic surgery have become apparent recently. We exploit the fact that plastic surgery bears on appearance in a non-uniform fashion(More)