Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,023,507 papers from all fields of science
Search
Sign In
Create Free Account
Biometrics
Known as:
Biometric authentication
, Behaviometrics
, Telebiometrics
Expand
Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Adversarial machine learning
Artifact (error)
Authentication
Automatic identification and data capture
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2012
Review
2012
Ear recognition based on local information fusion
Li Yuan
,
Zhichun Mu
Pattern Recognition Letters
2012
Corpus ID: 44919412
Review
2011
Review
2011
An Overview of Statistical Pattern Recognition Techniques for Speaker Verification
A. Fazel
,
S. Chakrabartty
IEEE Circuits and Systems Magazine
2011
Corpus ID: 15442831
Even though the subject of speaker verification has been investigated for several decades, numerous challenges and new…
Expand
Highly Cited
2010
Highly Cited
2010
Finite field arithmetic for cryptography
E. Savaş
,
Ç. Koç
IEEE Circuits and Systems Magazine
2010
Corpus ID: 40153716
Cryptography is one of the most prominent application areas of the finite field arithmetic. Almost all public-key cryptographic…
Expand
Highly Cited
2008
Highly Cited
2008
Random subspace for an improved BioHashing for face authentication
L. Nanni
,
A. Lumini
Pattern Recognition Letters
2008
Corpus ID: 6781984
Highly Cited
2007
Highly Cited
2007
A multi-matcher for ear authentication
L. Nanni
,
A. Lumini
Pattern Recognition Letters
2007
Corpus ID: 918469
Highly Cited
2005
Highly Cited
2005
On the Correctness of Operating System Kernels
M. Gargano
,
Mark A. Hillebrand
,
Dirk Leinenbach
,
W. Paul
International Conference on Theorem Proving in…
2005
Corpus ID: 13100398
The Verisoft project aims at the pervasive formal verification of entire computer systems. In particular, the seamless…
Expand
Highly Cited
2005
Highly Cited
2005
Two different approaches for iris recognition using Gabor filters and multiscale zero-crossing representation
Carmen Sánchez Ávila
,
R. Sánchez-Reillo
Pattern Recognition
2005
Corpus ID: 31175409
Highly Cited
2004
Highly Cited
2004
Personalised cryptographic key generation based on FaceHashing
A. Teoh
,
D. Ngo
,
A. Goh
Computers & security
2004
Corpus ID: 8286447
Highly Cited
2003
Highly Cited
2003
Detecting Eyelash and Reflection for Accurate Iris Segmentation
A. Kong
,
D. Zhang
International journal of pattern recognition and…
2003
Corpus ID: 12322501
Accurate iris segmentation is presented in this paper, which is composed of two parts, reflection detection and eyelash detection…
Expand
Review
2002
Review
2002
Information management of automatic data capture: an overview of technical developments
Alan D. Smith
,
Felix Offodile
Information Management & Computer Security
2002
Corpus ID: 37025094
Automatic identification and data capture/collection (AIDC) systems are one of the most widely used and under‐recognized IT…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE