Index

3-D multimodal fusion, 1

acceptability, 1

accumulator matrix, 1

accuracy , 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11

adaptive hard-switching network , 1

adaptive nonlinear fusion network , 1

adaptive weighted combination network,1

affine transformation, 1

AND rule, 1, 2, 3

approximate nearest neighbor, 1

arch, 1, 2

arithmetic mean rule, 1

authentication, 1

back propagation, 1

basic ensemble method, 1

BATH, see Bath University , 1, 2, 3

Bath university, 1

Bayes risk, 1

Bayes theorem, 1

Bayesian classifier, 1

behavior knowledge space, 1

behavioral biometric, 1, 2

BEM, see basic ensemble method

bimodal fusion, 1

binarization, 1

binary classifer, 1

biometric, 1, 2, 3, 4, 5, 6

biometric indexing, 1

biometric technology, 1, 2

BioSecure, 1, 2

BMF, see bimodal fusion

borda count, 1

borda count method, 1

Burrows-Wheeler transform, 1

BWT, see Burrows-Wheeler transform

CalTech , 1, 2, 3, 4, 5, 6, 7

canadian passenger accelerated service system, 1

cancelable biometric, 1

candidate set , 1, 2, 3, 4, 5, 67, 8

canonical correlation analysis , 1, 2

CANPASS, see canadian passenger accelerated service system

capturability, 1

Cartesian coordinate, 1

CASIA, see chinese academy of sciences institute of automation

CASIA-IrisV3-Interval, 1

CASIA-IrisV4-Thousand, 1

CASIAV3I, see CASIA-IrisV3-Interval , 1, 2, 3, 4

CASIAV4T, see CASIA-IrisV4-Thousand , 1, 2, 3

CBSR, see center for biometrics and security research

CCA, see canonical correlation analysis,1

cdf, 1

center for biometrics and security research, 1

chinese academy of sciences institute of automation, 1

circular tessellation, 1

circumviability, 1

CKS, see clustered kd-tree search , 1, 2, 3, 4, 5, 6, 7

classifier, 1

CLEAR, 1

closest point triangle, 1, 2

closest point triangulation, 1

clustered index space, 1, 2

clustered kd-tree index space , 1, 2

clustered kd-tree search, 1, 2

clustered search, 1, 2

clustering, 1

CMC, see cumulative match characteristics,1, 2, 3, 4, 5, 6

CMS, see cumulative match score , 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11

CN, see crossing number, 1

coherence, 1

color FERET, 1

color filter, 1

color level transform, 1

commercial-off-the-shelf , 12, 3, 4

complexity, 1

concatenation, 1

construct validity, 1

continuous classification, 1

convolution, 1, 2, 3

core, 1

cost, 1

COTS, see commercial-off-the-shelf , 1, 2, 3, 4

cross-modal fusion, 1

crossing number, 1

CS, see clustered search , 1, 2, 3, 4, 5, 6

cumulative distribution function , 1

cumulative match characteristics , 1

cumulative match score, 1

curvature, 1

dab print, 1

DARPA, see defense advanced research products agency

DCT, see discrete cosine transform

decision level fusion, 1, 2

decision module, 1

decision tree, 1

defense advanced research products agency, 1

delaunay triangle, 1

delaunay triangulations, 1

delta, 1, 2

department of homeland security , 1

determinant, 1, 2

DHS, see department of homeland security

discrete cosine transform, 1

distinctiveness, 1

downscaling, 1

efficiency , 1, 2, 3, 4, 5, 6, 7, 8

eigenface, 1

enroll, 1

enrollment, 1, 2, 3, 4, 5

equal error rate, 1, 2

ER, 1

erode, 1

ERR, see equal error rate , 1, 2, 3

Euclidean distance , 1, 2, 3, 4, 5, 6, 7, 8

even-symetric, 1

external validity, 1

eye coordinate, 1

eyelash, 1

eyelid, 1

face, 1, 2, 3, 4, 5, 6

face biometric data indexing , 1, 2

face detection, 1

face indexing, 1

face masking, 1

face recognition grand challenge , 1

facial recognition technology, 1

facial recognition vendor test, 1

failure to acquire, 1

failure to capture, 1

failure to enroll, 1

false accept rate, 1

false match rate, 1

false negative identification rate , 1

false non match rate, 1

false positive identification rate, 1

false reject rate, 1

FAR, see false accept rate, 1, 2

FBI, see federal bureau of investigation

feature descriptor , 1, 2, 3, 4, 5, 6

feature extraction, 1, 2, 3

feature extraction module, 1

feature level fusion, 1, 2, 3

feature vector, 1, 23

federal bureau of investigation, 1

FERET, see facial recognition technology,1, 2, 3, 4, 5, 6, 7

filter bank, 1, 2

fingerprint, 1, 2, 3, 4, 5

fingerprint biometric data indexing,1

fingerprint data indexing, 1

fingerprint identification system, 1

fingerprint indexing, 1

fingerprint mosaic, 1

fingerprint verification competition , 1, 2

fisher linear discriminant, 1

fixed fusion rule, 1

FLANN, 1, 2

FLD, see fisher linear discriminant , 1

FMR, see false match rate, 1

FNIR, see false negative identification rate , 1, 2, 3, 4, 5, 6

FNMR, see false non match rate , 1

FPIR, see false positive identification rate , 1, 2, 3, 4, 5, 6

frequency, 1

frequency domain, 1

frequency spectrum, 1

FRGC, 1, see face recognition grand challenge, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11

FRR, see false reject rate, 1, 2

FRVT, see facial recognition vendor test

FTA, see failure to acquire

FTC, see failure to capture

FTE, see failure to enroll

fusion, 1, 2, 3, 4

fusion level, 1, 2, 3, 4

fusion rule, 1, 2, 3

FVC, see fingerprint verification competition, 1, 2

FVC2004 DB1, 1

FVC2004 DB2, 1

FVC2004 DB3, 1

FVC2004 DB4, 1

Gabor, 1

Gabor energy feature , 1, 2, 3, 4, 5, 6, 7

Gabor feature, 1, 2

Gabor filter , 1, 2, 3, 4, 5, 6

Gabor wavelet, 1, 2

gait, 1

gallery , 1, 2, 3, 4, 5, 6, 7

GAR, see genuine accept rate

gating network, 1

Gaussian, 1, 2

Gaussian envelope, 1

Gaussian filter, 1, 2

GCC, see gnu compiler collection , 1, 2

GEM, see generalized ensemble method,

generalized ensemble method, 1

genuine accept rate, 1

genuine reject rate, 1

geometric hashing, 1

geometric normalization, 1, 2

gnu compiler collection, 1

gradient, 1, 2

GRR, see genuine reject rate

guided partitioning, 1

Haar wavelet, 1, 2

Hamming distance, 1, 2, 3

hand geometry, 1, 2, 3

handedness, 1

hash function, 1, 2, 3

hash generation, 1

hash table, 1

Hessian matrix, 1, 2, 3, 4

HG, see hash generation

Hilbert space, 1

histogram, 1, 2

histogram equalization, 1

hit rate, 1

HR, see hit rate , 1, 23, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 1516, 17, 18, 19, 20, 21, 22

IAFIS, see integrated automated fingerprint identification system

see international biometric group, 1, 2

ICA, see independent component analysis

identification, 1, 2

identification system , 1, 2, 3, 4

imposter, 1, 2, 3, 4, 5

independent component analysis , 1

index, 1

index cube, 12, 3, 4, 5

index key , 1, 2, 3, 4, 5, 6, 7, 89, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32

index score, 1

index space , 1, 2, 3, 4, 5, 6, 7, 8, 910

indexing , 1, 2, 3, 4, 5, 67, 8

infrared sensor, 1

integrated automated fingerprint identification system, 1

intensity enhancement, 1

inter ridge spacing, 1

internal validity, 1

international biometric group, 1

IRIS, see iris recognition immigration system

iris, 1, 2, 3, 4

iris biometric data indexing, 1

iris color-based indexing, 1, 2

iris data indexing, 1

iris indexing, 1

iris localization, 1

iris normalization, 1

iris recognition, 1

iris recognition immigration system,1

iris texture, 1, 2

iris texture-based indexing, 1, 2

IrisCode, 1, 2, 3

k-means clustering , 1, 2, 3, 4, 5, 6, 7, 8, 9

Karhunen-Loève, 1

Karnaugh map, 1

KCCA, see kernel canonical correlation analysis, 1, 2

kd-tree , 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22

kd-tree search, 1, 2

kd-tree structure, 1

kernel canonical correlation analysis,1, 2, 3

kernel fischer discriminant analysis,1

kernel function, 1, 2

kernel trick, 1

key point , 1, 2, 3, 4, 5, 6

key point descriptor, 1

KFDA, see kernel fischer discriminant analysis

KL, see Karhunen-Loève

KM, see Karnaugh map

Lagrange multiplier , 1, 2, 3, 4, 5

Laplacian, 1, 2, 3, 4

Laplacian of Gaussian, 1

latent semantic analysis, 1

LBP, see local binary pattern

LDA, see linear discriminant analysis,1

left loop, 1, 2

likelihood function, 1

likelihood ratio, 1, 2

linear, 1

linear discriminant analysis, 1, 2

linear index space , 1, 2, 3, 4

linear search, 1, 2, 3

linear storing, 1

linear structure, 1

local binary pattern, 1

local frequency, 1

local orientation, 1

locality sensitive hashing, 1

localization, 1

logistic regression, 1

logistic regression method, 1

loop, 1

LS, see linear search , 1, 2, 3, 4, 5, 6

LSA, see latent semantic analysis

LSH, see locality sensitive hashing

majority voting, 1, 2

map, 1

mask, 1

match score, 1, 2, 3, 4, 5

match-score level fusion, 1, 2

matching module, 1

maximum rule, 1, 2

MCC, see minutia cylinder-code , 1

mean, 1, 2

mean value, 1

median value, 1, 2, 3

memory requirement , 1, 2, 3, 4, 5, 6, 7, 8, 9

Mercer condition, 1

min-max, 1

minimum cost Bayesian classifier , 1

minimum rule, 1, 2

minutia cylinder-code, 1

minutiae, 1, 2, 3, 4, 5, 6

minutiae triplet, 1, 2

minutiae-based indexing, 1, 2

mixture-of-experts, 1

MLP, see multi layer perceptron , 1

MMU2, see Multimedia university , 1, 2, 3

MOE, see mixture-of-experts

multi layer perceptron, 1

multi-biometric, 1

multi-resolution, 1, 2

multimap, 1

Multimedia university, 1

multimodal, 1

multimodal biometric , 1, 2, 3, 4

multimodal biometric data indexing,1, 2, 3, 4

multiplicity, 1

national institute of science and technology, 1

neural network, 1

Neyman-Pearson, 1

NIST, see national institute of science and technology

NIST DB4, 1, 2, 3, 4

normalization, 1, 2, 3, 4

octave, 1

OpenCV, 1

optimal weighting method, 1

OR rule, 1, 2, 3

orientation , 1, 2, 3, 4, 5, 6, 7, 8

orientation assignment, 1

OWM, see optimal weighting methodq palmprint, 1, 2, 3

PCA, see principal component analysis,1, 2

PDF, see probability density function

penetration rate, 1

performance , 1, 2, 3, 4, 5, 6, 7

performance metric, 1

personal identification number, 1

physiological biometric, 1, 2

PIN, see personal identification number

polar coordinate, 1

posterior probability, 1

PR, see penetration rate, 1, 23, 4, 5, 6, 7, 8, 9, 10, 11, 1213, 14, 15, 16, 17, 18, 19

preprocessing, 1, 2, 3

principal component analysis , 1, 2, 3, 4

privacy, 1

privium program, 1, 2

probability density function, 1

probe , 1, 2, 3, 4, 5, 6, 7, 8

product rule, 1, 23, 4

pupil, 1

querying, 1

radial bias function, 1

rank , 1, 2, 3, 4, 5, 6, 7, 8, 9

rank level fusion, 1, 2, 3, 4

ranking, 1, 2

ranking function, 1

RBF, see radial bias function

reduction of high-scores effect, 1

retrieving , 1, 2, 3, 4, 5, 6, 7, 8

reusability, 1

RGB, 1

RHE, see reduction of high-scores effect, 1, 2, 3

ridge, 1, 2, 3, 4, 5

ridge bifurcation, 1, 2

ridge ending, 1, 2

ridge filtering, 1

ridge frequency, 1

ridge orientation-based indexing , 1, 2

right loop, 1, 2

robustness, 1

ROC, 1

rubber sheet model, 1

sample , 1, 2, 3, 4, 5, 6, 7, 8, 9, 10

scalability, 1

scale, 1, 2

scale face, 1

scale invariant, 1

scale invariant feature transform , 1

scale space, 1, 2, 3

scatter matrix, 1

schiphol airport, 1

sclera, 1

score, 1

score level fusion, 1

score normalization, 1

searching time , 1, 2, 3, 4, 5, 6, 7, 8, 9

segmentation, 1

sensor level fusion, 12

sensor module, 1

SIFT, see scale invariant feature transform, 1, 2

sigmoid, 1

signature, 1

signed pixel level difference histogram , 1

silhouette, 1

simple average, 1

singular point, 1

smoothing, 1

Sobel operator, 1

speed up robust feature , 1, 2, 3

SPLDH, see signed pixel level difference histogram

spoof attack, 1, 2

stability, 1

standard deviation, 1, 2, 3

storage, 1

storing , 1, 2, 3, 45, 67, 8

subject , 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13

sum rule, 1, 2, 3, 4

support vector, 1, 2, 3

support vector machine, 1

SURF, see speed up robust feature,1, 2, 3, 4, 5, 6, 7, 8

SVM, see support vector machine , 1, 2, 3, 45, 6, 7, 8, 9, 10, 11

SVM rank, 1, 2

SVM ranking, 1, 2

sweep sensor, 1

tactile sensor, 1

tanh, 1

temporal, 1

tented arch, 1, 2

thinning, 1

threats to validity, 1, 2

trained fusion rule, 1, 2

transportation security administration,1

triplet, 1, 2, 34

triplet set , 1, 2

TSA, see transportation security administration

UIDAI, see unique identification authority of india

unimodal, 1, 2

unimodal biometric, 1

unique identification authority of india, 1

universality, 1

US visit, 1

user weighting, 1

valley, 1, 2, 3, 4

variance, 1, 2, 3, 4, 5

verification, 1

verified identity pass, 1

VIP, see verified identity pass

virtual user, 1, 2, 3

voice, 1, 2, 3

weighted average, 1

weighted majority voting, 1

weighted product rule, 1, 2

weighted sum rule, 1, 2, 3

West Virginia university, 1

whorl, 1, 2

WVU, see West Virginia university,1, 2, 3, 4, 5, 6

YCbCr, 1

z-score, 1

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.191.205.99