Search
Search Results
-
Conclusion
This chapter concludes the book. Firstly, the book is summarised and some of the key points from each of the chapters are provided. The summary first... -
Continuous Authentication
This chapter introduces continuous biometric authentication. Initially the concept is introduced and the key components are discussed. The device... -
Introduction
The demand for user devices has grown rapidly in the last decade. This has been facilitated by technological advancements making devices cheaper,... -
Conclusion and Future Work
In this chapter, we summarize this book and put forward the potential research directions in the future. -
Introduction
In this chapter, we will introduce the background knowledge of audio signal processing, voice processing systems, and attacks on speaker verification... -
Modulated Audio Replay Attack and Dual-Domain Defense
Automatic speech recognition (ASR) systems have been widely deployed in modern smart devices to provide convenient and diverse voice-controlled... -
Convolutional Neural Networks and Architectures
This chapter briefly introduces Convolutional Neural Networks (CNNs). One of the first CNNs is proposed in [41] (known as LeNet) to deal with... -
Facial Attribute Analysis
Facial attributes indicate the intuitive semantic descriptions of a human face like gender, race, expression, and so on. In the past few years,... -
Face Presentation Attack Detection
Face recognition technology has been widely used in daily interactive applications such as checking-in and mobile payment due to its convenience and... -
Decision Boundaries in Feature Space
Decision boundaries partition feature space so that samples from different classes are in different compartments. Classification applies a predicate... -
Basic Network Training for Image Classification
We review basic aspects of network training and explore the influence of different decisions on the training success. An important hyperparameter for... -
Bayesian Image Classification in Feature Space
In this chapter, we will define image classification as probabilistic decision making in feature space. The Bayesian theorem is applied to define the... -
Secure Voice Processing Systems against Malicious Voice Attacks
This book provides readers with the basic understanding regarding the threats to the voice processing systems, the state-of-the-art defense methods...
-
Continuous Biometric Authentication Systems An Overview
This book offers an overview of the field of continuous biometric authentication systems, which capture and continuously authenticate biometrics from... -
Gehirn-Computer-Schnittstelle (BCI), basierend auf der EEG-Signalzerlegung, Schmetterlingsoptimierung und maschinellem Lernen
Die Gehirn-Computer-Schnittstelle (BCI) ist eine Technologie, die Menschen mit Behinderungen hilft, Hilfsgeräte zu bedienen, indem sie neuromuskuläre... -
Durch Deep Learning unterstütztes Biofeedback
Nach 60 Jahren Entwicklung von Biofeedback für Gehirnwellen, grundlegender und angewandter Forschung, Therapie und dem Bau verschiedener Geräte gibt... -
Segmentierung von Ekzem-Hautläsionen mit Deep Neural Network (U-Net)
Atopisches Ekzem ist eine Hauterkrankung, die trockene, juckende und entzündete Haut verursacht. Die Behandlung von Ekzemen erfordert die Erkennung... -
Secure Voice Processing Systems for Driverless Vehicles
Driverless vehicles are becoming an irreversible trend in our daily lives, and humans can interact with cars through in-vehicle voice control... -
-
Biometrics for Continuous Authentication
This section discusses the concept of biometrics and the requirements generally needed for a biometric used for authentication. Then the different...