메뉴 건너뛰기




Volumn 4277 LNCS - I, Issue , 2006, Pages 479-488

Robustness of biometric gait authentication against impersonation attack

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COMPUTER VISION; DATA PRIVACY; PATTERN RECOGNITION; SECURITY OF DATA; SENSORS;

EID: 33845398690     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11915034_71     Document Type: Conference Paper
Times cited : (49)

References (25)
  • 2
    • 0242313580 scopus 로고    scopus 로고
    • Zernike velocity moments for description and recognition of moving shapes
    • Session 8: Modelling Behaviour
    • J.Shutler and M.Nixon. Zernike velocity moments for description and recognition of moving shapes. In British Machine Vision Conference, pages 11/1 - 11/4, 2001. Session 8: Modelling Behaviour.
    • (2001) British Machine Vision Conference
    • Shutler, J.1    Nixon, M.2
  • 3
    • 0242313583 scopus 로고    scopus 로고
    • Automatic extraction and description of human gait models for recognition purposes
    • D. Cunado, M. Nixon, and J. Carter. Automatic extraction and description of human gait models for recognition purposes. In Computer Vision and Image Understanding, pages 1-41, 2003.
    • (2003) Computer Vision and Image Understanding , pp. 1-41
    • Cunado, D.1    Nixon, M.2    Carter, J.3
  • 9
    • 33744957579 scopus 로고    scopus 로고
    • A new representation for human gait recognition: Motion silhouettes image (msi)
    • Toby H. W. Lam and Raymond S. T. Lee. A new representation for human gait recognition: Motion silhouettes image (msi). In ICB, pages 612-618, 2006.
    • (2006) ICB , pp. 612-618
    • Lam, T.H.W.1    Lee, R.S.T.2
  • 10
    • 33744996037 scopus 로고    scopus 로고
    • Gait recognition based on fusion of multi-view gait sequences
    • Yuan Wang, Shiqi Yu, Yunhong Wang, and Tieniu Tan. Gait recognition based on fusion of multi-view gait sequences. In ICB, pages 605-611, 2006.
    • (2006) ICB , pp. 605-611
    • Yuan, W.1    Shiqi, Y.2    Yunhong, W.3    Tieniu, T.4
  • 11
    • 0142184779 scopus 로고    scopus 로고
    • Introduction to applications and industries for microelectromechanical systems (MEMS)
    • Jeremy A. Walraven. Introduction to applications and industries for microelectromechanical systems (MEMS). In International Test Conference, pages 674-680, 2003.
    • (2003) International Test Conference , pp. 674-680
    • Walraven, J.A.1
  • 19
    • 85135261394 scopus 로고    scopus 로고
    • Vulnerability in speaker verification - A study of technical impostor techniques
    • Lindberg J. and Blomberg M. Vulnerability in speaker verification - a study of technical impostor techniques. In Eurospeech, pages 1211-1214, 1999.
    • (1999) Eurospeech , pp. 1211-1214
    • Lindberg, J.1    Blomberg, M.2
  • 25
    • 33746671853 scopus 로고    scopus 로고
    • Attention, memory, and wearable interfaces
    • Oct.-Dec.
    • Starner T.E. Attention, memory, and wearable interfaces. Pervasive Computing, IEEE, Vol. 1, Issue 4:88-91, Oct.-Dec. 2002.
    • (2002) Pervasive Computing, IEEE , vol.1 , Issue.4 , pp. 88-91
    • Starner, T.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.