Handbook of Multimedia Information Security: Techniques and Applications 2019
DOI: 10.1007/978-3-030-15887-3_2
|View full text |Cite
|
Sign up to set email alerts
|

An Overview of Biometrics Methods

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(19 citation statements)
references
References 58 publications
0
13
0
Order By: Relevance
“…The CTIA is configured in direct mode: sw1 and sw4 are closed, and sw2 and sw3 are open. The equivalent circuit of Figure 7b shows the CTIA acting as a conventional integrator, and Equation (2) shows how it computes the output voltage that represents the local pixel value:…”
Section: Smart Pixelmentioning
confidence: 99%
See 1 more Smart Citation
“…The CTIA is configured in direct mode: sw1 and sw4 are closed, and sw2 and sw3 are open. The equivalent circuit of Figure 7b shows the CTIA acting as a conventional integrator, and Equation (2) shows how it computes the output voltage that represents the local pixel value:…”
Section: Smart Pixelmentioning
confidence: 99%
“…The attention of the scientific and industrial community in image-based biometric methods has fostered a growing interest in smart imaging systems (SIS) that can handle the computational requirements of real-time video analysis. Biometrics is described as a pattern-recognition technique for individual identification, based on their physical, chemical, or behavioral characteristics [ 1 , 2 ]. One of the most popular biometric techniques is face recognition [ 2 ], which has abundant applications [ 3 , 4 , 5 ] in various areas, such as: (1) security, including identity verification [ 6 , 7 ], computer or mobile device unlock [ 7 , 8 ], criminal records search, and voter registration; (2) surveillance, such as cameras used on closed circuit television (CCTV) [ 9 ]; and (3) access control that could grant access to a specific place or an electronic account to a group of people [ 10 ] using their faces as a credential.…”
Section: Introductionmentioning
confidence: 99%
“…These grain crops and legumes having rich source of nutrients, minerals, dietary fibers that directly related to the humans heath and prevent from health disorders. But due to pandemic situation like COVID-19 it cause the instability in the economy; in such situation food security becomes the important concern of the modern world to secure the future supply, as according to United Nations (UN) report the population of the world increase by 8 billion people in 2023 and 10 billion in 2050 [3]. Due to some factors like non-identification and late detection of diseases can waste up to 40% of agriculture products [4].…”
Section: Introductionmentioning
confidence: 99%
“…Through the surveillance, there are huge video data gathered through these systems, and to keep al., 2018), and person re-identification (Fayyaz, M., Yasmin, M., et al, 2020;Rehman, S. U., Chen, Z., et al, 2018;Rehman, S., Chen, Z., et al, 2016, July;Hussain, S. J., Chen, Z., et al, 2016, January, etc. ), biometrics (Sharif, M., Raza, M., et al, 2019;Azeem, A., Sharif, M., et al, 2015), and Satellite imaging (Sharif, M., Khan, S., et al. 2019, April) etc.…”
Section: Introductionmentioning
confidence: 99%