Skip to Content
Biometric Authentication: A Machine Learning Approach
book

Biometric Authentication: A Machine Learning Approach

by S. Y. Kung, M. W. Mak, S. H. Lin
September 2004
Intermediate to advanced
496 pages
13h 57m
English
Pearson
Content preview from Biometric Authentication: A Machine Learning Approach

5.7. Biometric Authentication Application Examples

Note that most biometric data can be adequately represented by a mixture of Gaussians, and also that RBF neural networks adopt basically the same type of Gaussian kernels. Therefore, RBF networks are more appealing for biometric applications than LBF networks. In fact, RBF and EBF networks have been used extensively in biometric applications. For instance, Brunelli and Poggio [38] used a special type of RBF network, called the "HyperBF" network, for face recognition and reported a 100% recognition rate on a 47-person database. In a speaker verification task, Mak and Kung [225] demonstrated that EBF networks perform substantially better than their RBF counterparts; and in a speaker identification ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advances in Biometrics for Secure Human Authentication and Recognition

Advances in Biometrics for Secure Human Authentication and Recognition

Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing
Touchless Fingerprint Biometrics

Touchless Fingerprint Biometrics

Ruggero Donida Labati, Vincenzo Piuri, Fabio Scotti
Signal and Image Processing for Biometrics

Signal and Image Processing for Biometrics

Amine Naït-Ali, Régis Fournier
Public-key Cryptography: Theory and Practice

Public-key Cryptography: Theory and Practice

Abhijit Das, C. E. Veni Madhavan

Publisher Resources

ISBN: 0131478249Purchase book