6

MICHE competitions: A realistic experience with uncontrolled eye region acquisition

People struggle every day with authentication to access a protected service or location, or simply aimed at protecting one’s own devices. This spurs a growing demand for self-handled authentication strategies. The increasing number of remote services …

Unconstrained data acquisition frameworks and protocols

The identification of humans in non-ideal conditions has been gaining increasing attention, mainly supported by the multitude of novel methods specifically developed to address the covariates of non-cooperative biometric recognition. Surveillance …

Automatic face image tagging in large collections

In this chapter, the authors present some issues related to automatic face image tagging techniques. Their main purpose in user applications is to support the organization (indexing) and retrieval (or easy browsing) of images or videos in large …

Unconstrained ear processing: What is possible and what must be done

Ear biometrics, compared with other physical traits, presents both advantages and limits. First of all, the small surface and the quite simple structure play a controversial role. On the positive side, they allow faster processing than, say, face …