Learn More
Iannarelli's studies showed that ear shape can be considered a biometric identifier able to authenticate people as well as more established biometrics like face or voice, for instance. However, very few researches can be found in literature about ear recognition. In most cases techniques already working in other biometric fields, such as PCA (Principal(More)
Government agencies are investing a considerable amount of resources into improving security systems as result of recent terrorist events that dangerously exposed flaws and weaknesses in today's safety mechanisms. Badge or password-based authentication procedures are too easy to hack. Biometrics represents a valid alternative but they suffer of drawbacks as(More)
We present an image indexing method and a system to perform content-based retrieval in heterogeneous image databases (IDB). The method is based upon the fractal framework of the iterated function systems (IFS) widely used for image compression. The image index is represented through a vector of numeric features, corresponding to contractive functions (CF)(More)
Fractal image compression has received much attention from the research community because of some desirable properties like resolution independence, fast decoding, and very competitive rate-distortion curves. Despite the advances made, the long computing times in the encoding phase still remain the main drawback of this technique. So far, several methods(More)
In the last years, the industrial world has been increasingly adopting computer-aided solutions for design for maintainability and maintenance training tasks with the goal to reduce development costs and to shorten time, and to improve product and service quality. Computer-based training systems created to simulate machine assembly maintenance are normally(More)
—Research on biometrics has noticeably increased. However, no single bodily or behavioral feature is able to satisfy acceptability, speed, and reliability constraints of authentication in real applications. The present trend is therefore toward multimodal systems. In this paper, we deal with some core issues related to the design of these systems and(More)
a r t i c l e i n f o Mobile devices, namely phones and tablets, have long gone " smart ". Their growing use is both a cause and an effect of their technological advancement. Among the others, their increasing ability to store and exchange sensitive information, has caused interest in exploiting their vulnerabilities, and the opposite need to protect users(More)