SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Galbally J.) "

Sökning: WFRF:(Galbally J.)

  • Resultat 1-10 av 11
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  •  
2.
  • Galbally-Herrero, J., et al. (författare)
  • On the vulnerability of fingerprint verification systems to fake fingerprint attacks
  • 2006
  • Ingår i: Proceedings. - Piscataway, N.J. : IEEE Press. - 9781424401741 ; , s. 130-136
  • Konferensbidrag (refereegranskat)abstract
    • A new method to generate gummy fingers is presented. A medium-size fake fingerprint database is described and two different fingerprint verification systems are evaluated on it. Three different scenarios are considered in the experiments, namely: enrollment and test with real fingerprints, enrollment and test with fake fingerprints, and enrollment with real fingerprints and test with fake fingerprints. Results for an optical and a thermal sweeping sensors are given. Both systems are shown to be vulnerable to direct attacks. © 2006 IEEE.
  •  
3.
  • Alonso-Fernandez, Fernando, et al. (författare)
  • Exploiting Character Class Information in Forensic Writer Identification
  • 2011
  • Ingår i: Computational forensics. - Berlin : Springer Berlin/Heidelberg. - 9783642193750 ; , s. 31-42
  • Konferensbidrag (refereegranskat)abstract
    • Questioned document examination is extensively used by forensic specialists for criminal identification. This paper presents a writer recognition system based on contour features operating in identification mode (one-to-many) and working at the level of isolated characters. Individual characters of a writer are manually segmented and labeled by an expert as pertaining to one of 62 alphanumeric classes (10 numbers and 52 letters, including lowercase and uppercase letters), being the particular setup used by the forensic laboratory participating in this work. Three different scenarios for identity modeling are proposed, making use to a different degree of the class information provided by the alphanumeric samples. Results obtained on a database of 30 writers from real forensic documents show that the character class information given by the manual analysis provides a valuable source of improvement, justifying the significant amount of time spent in manual segmentation and labeling by the forensic specialist. © 2011 Springer-Verlag Berlin Heidelberg.
  •  
4.
  • Alonso-Fernandez, Fernando, et al. (författare)
  • Robustness of signature verification systems to imitators with increasing skills
  • 2009
  • Ingår i: ICDAR '09. - Los Alamitos, Calif. : IEEE Computer Society. - 9780769537252
  • Konferensbidrag (refereegranskat)abstract
    • In this paper, we study the impact of an incremental level of skill in the forgeries against signature verification systems. Experiments are carried out using both off-line systems, involving the discrimination of signatures written on a piece of paper, and on-line systems, in which dynamic information of the signing process (such as velocity and acceleration) is also available. We use for our experiments the BiosecurID database, which contains both on-line and off-line versions of signatures, acquired in four sessions across a 4 month time span with incremental level of skill in the forgeries for different sessions. We compare several scenarios with different size and variability of the enrolment set, showing that the problem of skilled forgeries can be alleviated as we consider more signatures for enrolment. © 2009 IEEE.
  •  
5.
  • Galbally, J., et al. (författare)
  • Fingerprint Liveness Detection Based on Quality Measures
  • 2009
  • Ingår i: 2009 1st IEEE International Conference on Biometrics, Identity and Security, BIdS 2009. - Piscataway, N.J. : IEEE Press. - 9781424452767 ; , s. 1-8
  • Konferensbidrag (refereegranskat)abstract
    • A new fingerprint parameterization for liveness detection based on quality measures is presented. The novel feature set is used in a complete liveness detection system and tested on the development set of the LivDET competition, comprising over 4,500 real and fake images acquired with three ditTerent optical sensors. The proposed solution proves to be robust to the multi-sensor scenario, and presents an overall rate of 93% of correctly classified samples. Furthermore, the liveness detection method presented has the added advantage over previously studied techniques of needing just one image from a finger to decide whether it is real or fake.
  •  
6.
  • Ruiz-Albacete, V., et al. (författare)
  • Direct attacks using fake images in iris verification
  • 2008
  • Ingår i: Biometrics and Identity Management. - Berlin : Springer Berlin/Heidelberg. - 9783540899907 ; , s. 181-190
  • Konferensbidrag (refereegranskat)abstract
    • In this contribution, the vulnerabilities of iris-based recognition systems to direct attacks are studied. A database of fake iris images has been created from real iris of the BioSec baseline database. Iris images are printed using a commercial printer and then, presented at the iris sensor. We use for our experiments a publicly available iris recognition system, which some modifications to improve the iris segmentation step. Based on results achieved on different operational scenarios, we show that the system is vulnerable to direct attacks, pointing out the importance of having countermeasures against this type of fraudulent actions. © 2008 Springer Berlin Heidelberg.
  •  
7.
  • Forslund, Tommie, et al. (författare)
  • Attachment goes to court : child protection and custody issues
  • 2022
  • Ingår i: Attachment & Human Development. - : Taylor & Francis Group. - 1461-6734 .- 1469-2988. ; 24:1, s. 1-52
  • Tidskriftsartikel (refereegranskat)abstract
    • Attachment theory and research are drawn upon in many applied settings, including family courts, but misunderstandings are widespread and sometimes result in misapplications. The aim of this consensus statement is, therefore, to enhance understanding, counter misinformation, and steer family-court utilisation of attachment theory in a supportive, evidence-based direction, especially with regard to child protection and child custody decision-making. The article is divided into two parts. In the first, we address problems related to the use of attachment theory and research in family courts, and discuss reasons for these problems. To this end, we examine family court applications of attachment theory in the current context of the best-interest-of-the-child standard, discuss misunderstandings regarding attachment theory, and identify factors that have hindered accurate implementation. In the second part, we provide recommendations for the application of attachment theory and research. To this end, we set out three attachment principles: the child’s need for familiar, non-abusive caregivers; the value of continuity of good-enough care; and the benefits of networks of attachment relationships. We also discuss the suitability of assessments of attachment quality and caregiving behaviour to inform family court decision-making. We conclude that assessments of caregiver behaviour should take center stage. Although there is dissensus among us regarding the use of assessments of attachment quality to inform child custody and child-protection decisions, such assessments are currently most suitable for targeting and directing supportive interventions. Finally, we provide directions to guide future interdisciplinary research collaboration.
  •  
8.
  • Forslund, Tommie, et al. (författare)
  • El Apego Va a Juicio: Problemas de Custodia y Protección Infantil : [Attachment goes to court: Child protection and custody issues]
  • 2021
  • Ingår i: Anuario de psicología jurídica. - : Colegio Oficial de la Psicologia de Madrid. - 1133-0740 .- 2174-0542. ; 32:1, s. 115-139
  • Tidskriftsartikel (refereegranskat)abstract
    • Attachment theory and research are drawn upon in many applied settings, including family courts, but misunderstandings are widespread and sometimes result in misapplications. The aim of this consensus statement is, therefore, to enhance understanding, counter misinformation, and steer family-court utilisation of attachment theory in a supportive, evidence-based direction, especially with regard to child protection and child custody decision-making. This article is divided into two parts. In the first part, we address problems related to the use of attachment theory and research in family courts, and discuss reasons for these problems. To this end, we examine family court applications of attachment theory in the current context of the best-interest-of-the-child standard, discuss misunderstandings regarding attachment theory, and identify factors that have hindered accurate implementation. In the second part, we provide recommendations for the application of attachment theory and research. To this end, we set out three attachment principles: the child's need for familiar, non-abusive caregivers; the value of continuity of good-enough care; and the benefits of networks of attachment relationships. We also discuss the suitability of assessments of attachment quality and caregiving behaviour to inform family court decision-making. We conclude that assessments of caregiver behaviour should take center stage. Although there is dissensus among us regarding the use of assessments of attachment quality to inform child custody and child-protection decisions, such assessments are currently most suitable for targeting and directing supportive interventions. Finally, we provide directions to guide future interdisciplinary research collaboration.
  •  
9.
  •  
10.
  • Fierrez, Julian, et al. (författare)
  • BiosecurID : A Multimodal Biometric Database
  • 2010
  • Ingår i: Pattern Analysis and Applications. - New York, USA : Springer-Verlag New York. - 1433-7541 .- 1433-755X. ; 13:2, s. 235-246
  • Tidskriftsartikel (refereegranskat)abstract
    • A new multimodal biometric database, acquired in the framework of the BiosecurID project, is presented together with the description of the acquisition setup and protocol. The database includes eight unimodal biometric traits, namely: speech, iris, face (still images, videos of talking faces), handwritten signature and handwritten text (on-line dynamic signals, off-line scanned images), fingerprints (acquired with two different sensors), hand (palmprint, contour-geometry) and keystroking. The database comprises 400 subjects and presents features such as: realistic acquisition scenario, balanced gender and population distributions, availability of information about particular demographic groups (age, gender, handedness), acquisition of replay attacks for speech and keystroking, skilled forgeries for signatures, and compatibility with other existing databases. All these characteristics make it very useful in research and development of unimodal and multimodal biometric systems. © Springer-Verlag London Limited 2009.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 11

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy