搜索资源列表
code
- biometric fingerprint recognytion system using gabor features extration
attachments_2009_03_25
- signature and voice recognition
spid
- Speaker recognition is the process of identifying a person based on his voice. It is a challenging task to separate the speaker identity information (who is speaking it) from the speech content itself (what is being said). Speaker recognition
iriscode
- generates a biometric template from an iris in an eye image.-generates a biometric template from an iris in an eye image.
dp2
- DTW is one of the method to identify speech and signature or any biometric hope to enjoy it
goodmobileirisrecognition
- Mobile iris recognition systems: An emerging biometric technology
generateCMC
- Generates the values in a Cumulative Match Characteristic (CMC) curve given a similarity matrix. For use in evaluation of biometric recognition systems (e.g. fingerprint, face, iris, etc.)
biometrics_network_security
- biometric recognition
fusion-of-face-a-ear-using-wavelet-at-sensor-leve
- program on image processing based on MATLAB for biometric recognition
B
- Matlab codes for biometric recognition
som1
- selforganising map for the matching algorithm for the biometric appilcations enroll ment
Implementation-and-Evaluation-of-NIST-Biometric-I
- IN THIS WE ARE ABLE TO ANALYZE Implementation and Evaluation of NIST Bio-metric Image Software for Fingerprint Recognition.zip
src-fusion
- A. Fusion at the Feature Extraction Level The data obtained from each sensor is used to compute a feature vector. As the features extracted from one biometric trait are independent of those extracted from the other, it is reasonable to con
ear-matlab
- 人耳识别功能,可以处理人耳图像并且识别出来,是一种生物识别技术-Ear Recognition function that can handle images and identified the human ear, is a biometric technology
dvv
- 延时矢量方差(DVV)方法使用的可预测性的信号在相空间来描述时间序列。DVV方法已经成功地应用于分析生物信号的性质(EEG和fMRI)。-The Delay vector variance (DVV) method uses predictability of the signal in phase space to characterize the time series.The DVV method has been successfully applied to analyse the n
FINAL
- Nowadays security becomes a most important issue regarding a spoof attack. So, multimodal biometrics technology has attracted substantial interest for its highest user acceptance, high security, high accuracy, low spoof attack and high recognition
05396172
- In this paper we proposed a method of embedding owner’s speech signal. Speech being a biometric data, the watermark signal in this method is expected to be more meaningful and has closer correlation with copyright holder. The main issue of co
biometric-tests
- This rar file includes codes for main1.m - training the falseacceptancerate.m FAR checking with different thresholds falserejectionrate.m - FRR checking with different thresholds mainranktest.m - identification checking plot plotting CMC
Normalization, both in direction and in position
- If you have an image containing one or more object and you want to change their dirction to y axes, it can help you.For example in some recognition system (biometric), we need to normalize the object in image both in direction and in position for rob
Matlab-Biometric-recognition-Gait-Biometric-Recognit
- Matlab-Biometric-recognition-Gait-Biometric-Recognition