Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,246,643 papers from all fields of science
Search
Sign In
Create Free Account
Biometrics
Known as:
Biometric authentication
, Behaviometrics
, Telebiometrics
Expand
Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Adversarial machine learning
Artifact (error)
Authentication
Automatic identification and data capture
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Iris recognition based on bidimensional empirical mode decomposition and fractal dimension
Wei-Kuei Chen
,
Jen-Chun Lee
,
W. Han
,
Chih-Kuang Shih
,
Ko-Chin Chang
Information Sciences
2013
Corpus ID: 34087555
2013
2013
Erratum to: Allometric equations for estimating aboveground biomass of Coffea arabica L. grown in the Rift Valley escarpment of Ethiopia
M. Negash
,
M. Starr
,
M. Kanninen
,
Leakemaraiam Berhe
Agroforestry Systems
2013
Corpus ID: 16845287
Coffee, Coffea arabica L., which is native to Ethiopia, is the world’s most widely traded tropical agricultural commodity. While…
Expand
Review
2012
Review
2012
Ear recognition based on local information fusion
Li Yuan
,
Zhichun Mu
Pattern Recognition Letters
2012
Corpus ID: 44919412
Highly Cited
2009
Highly Cited
2009
Subtle facial expression recognition using motion magnification
Sungsoo Park
,
Daijin Kim
Pattern Recognition Letters
2009
Corpus ID: 5271980
2008
2008
Trust-enhanced Security in Location-based Adaptive Authentication
G. Lenzini
,
M. Bargh
,
B. Hulsebosch
STM@ESORICS
2008
Corpus ID: 1167418
Highly Cited
2007
Highly Cited
2007
A multi-matcher for ear authentication
L. Nanni
,
A. Lumini
Pattern Recognition Letters
2007
Corpus ID: 918469
Highly Cited
2005
Highly Cited
2005
Two different approaches for iris recognition using Gabor filters and multiscale zero-crossing representation
Carmen Sánchez Ávila
,
R. Sánchez-Reillo
Pattern Recognition
2005
Corpus ID: 31175409
Highly Cited
2005
Highly Cited
2005
On the Correctness of Operating System Kernels
M. Gargano
,
Mark A. Hillebrand
,
Dirk Leinenbach
,
W. Paul
International Conference on Theorem Proving in…
2005
Corpus ID: 13100398
The Verisoft project aims at the pervasive formal verification of entire computer systems. In particular, the seamless…
Expand
Highly Cited
2003
Highly Cited
2003
Detecting Eyelash and Reflection for Accurate Iris Segmentation
A. Kong
,
D. Zhang
International journal of pattern recognition and…
2003
Corpus ID: 12322501
Accurate iris segmentation is presented in this paper, which is composed of two parts, reflection detection and eyelash detection…
Expand
Highly Cited
2003
Highly Cited
2003
Understanding users' keystroke patterns for computer access security
Aykut Güven
,
I. Sogukpinar
Computers & security
2003
Corpus ID: 8588273
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE