People struggle every day with authentication to access a protected service or location, or simply aimed at protecting one’s own devices. This spurs a growing demand for self-handled authentication strategies. The increasing number of remote services …
The identification of humans in non-ideal conditions has been gaining increasing attention, mainly supported by the multitude of novel methods specifically developed to address the covariates of non-cooperative biometric recognition. Surveillance …
In this chapter, the authors present some issues related to automatic face image tagging techniques. Their main purpose in user applications is to support the organization (indexing) and retrieval (or easy browsing) of images or videos in large …
Ear biometrics, compared with other physical traits, presents both advantages and limits. First of all, the small surface and the quite simple structure play a controversial role. On the positive side, they allow faster processing than, say, face …