The combination of different experts is largely used to improve the performance of a pattern recognition system. In the case of experts whose output is a similarity score, different methods had been developed. In this paper, the combination is performed by building a similarity score space made up of the scores produced by the experts, and...
-
2008 (v1)PublicationUploaded on: May 13, 2023
-
2009 (v1)Publication
An "expert" for biometric authentication systems is made up of three components: a biometric sensor, a feature extraction module, and a matching algorithm. As in many application the performance attained by individual experts does not provide the required reliability, improvements can be provided by the combination of different experts....
Uploaded on: April 14, 2023 -
2009 (v1)Publication
In two-class score-based problems the combination of scores from an ensemble of experts is generally used to obtain distributions for positive and negative patterns that exhibit a larger degree of separation than those of the scores to be combined. Typically, combination is carried out by a "static" linear combination of scores, where the...
Uploaded on: February 4, 2024 -
2008 (v1)Publication
The combination of experts is used to improve the performance of a classification system. In this paper we propose three dynamic score combination techniques that embed the selection and the fusion approach for combining experts. The proposed techniques are designed to combine binary experts that output a score measuring the degree of...
Uploaded on: February 7, 2024 -
2007 (v1)Publication
A biometric system for user authentication produces a matching score representing the degree of similarity of the input biometry with the set of templates for that user. If the score is greater than a prefixed threshold, then the user is accepted, otherwise the user is rejected. Typically the performance are evaluated in terms of the receiver...
Uploaded on: February 7, 2024 -
2007 (v1)Publication
A biometric system produces a matching score representing the degree of similarity of the input with the set of templates for that user. If the score is greater than a prefixed threshold, then the user is accepted, otherwise the user is rejected. Typically, the performance is evaluated in terms of the Receiver Operating Characteristic (ROC)...
Uploaded on: February 11, 2024 -
2005 (v1)Publication
Fingerprints are one of the most used biometrics for automatic personal authentication. Unfortunately, it is often difficult to design fingerprint matchers exhibiting the performances required in real applications. To meet the application requirements, fusion techniques based on multiple matching algorithms, multiple fingerprints, and multiple...
Uploaded on: February 11, 2024 -
2007 (v1)Publication
In the biometric field, different experts are combined to improve the system reliability, as in many application the performance attained by individual experts (i.e., different sensors, or processing algorithms) does not provide the required reliability. However, there is no guarantee that the combination of any ensemble of experts provides...
Uploaded on: February 11, 2024 -
2010 (v1)Publication
In two-class problems, the combination of the outputs (scores) of an ensemble of classifiers is widely used to attain high performance. Dynamic combination techniques that estimate the combination parameters on a pattern per pattern basis, usually provide better performance than those of static combination techniques. In this paper, we propose...
Uploaded on: April 14, 2023 -
2010 (v1)Publication
In two-class problems, the linear combination of the outputs (scores) of an ensemble of classifiers is widely used to attain high performance. In this paper we investigate some techniques aimed at dynamically estimate the coefficients of the linear combination on a pattern per pattern basis. We will show that such a technique allows providing...
Uploaded on: January 31, 2024 -
2011 (v1)Publication
We faced the problem of detecting 2-D face spoofing attacks performed by placing a printed photo of a real user in front of the camera. For this type of attack it is not possible to relay just on the face movements as a clue of vitality because the attacker can easily simulate such a case, and also because real users often show a "low vitality"...
Uploaded on: February 14, 2024 -
2013 (v1)Publication
As a crucial security problem, anti-spoofing in biometrics, and particularly for the face modality, has achieved great progress in the recent years. Still, new threats arrive inform of better, more realistic and more sophisticated spoofing attacks. The objective of the 2nd Competition on Counter Measures to 2D Face Spoofing Attacks is to...
Uploaded on: February 7, 2024