Spelling suggestions: "subject:"arecognition systems"" "subject:"2recognition systems""
261 |
A tree grammar-based visual password schemeOkundaye, Benjamin January 2016 (has links)
A thesis submitted to the Faculty of Science, University of the Witwatersrand, Johannesburg, in fulfilment of the requirements for the degree of Doctor of Philosophy. Johannesburg, August 31, 2015. / Visual password schemes can be considered as an alternative to alphanumeric
passwords. Studies have shown that alphanumeric passwords
can, amongst others, be eavesdropped, shoulder surfed, or
guessed, and are susceptible to brute force automated attacks. Visual
password schemes use images, in place of alphanumeric characters,
for authentication. For example, users of visual password schemes either
select images (Cognometric) or points on an image (Locimetric)
or attempt to redraw their password image (Drawmetric), in order
to gain authentication. Visual passwords are limited by the so-called
password space, i.e., by the size of the alphabet from which users can
draw to create a password and by susceptibility to stealing of passimages
by someone looking over your shoulders, referred to as shoulder
surfing in the literature. The use of automatically generated highly
similar abstract images defeats shoulder surfing and means that an almost
unlimited pool of images is available for use in a visual password
scheme, thus also overcoming the issue of limited potential password
space.
This research investigated visual password schemes. In particular,
this study looked at the possibility of using tree picture grammars to
generate abstract graphics for use in a visual password scheme. In this
work, we also took a look at how humans determine similarity of abstract
computer generated images, referred to as perceptual similarity
in the literature. We drew on the psychological idea of similarity and
matched that as closely as possible with a mathematical measure of
image similarity, using Content Based Image Retrieval (CBIR) and
tree edit distance measures. To this end, an online similarity survey
was conducted with respondents ordering answer images in order
of similarity to question images, involving 661 respondents and 50
images. The survey images were also compared with eight, state of
the art, computer based similarity measures to determine how closely
they model perceptual similarity. Since all the images were generated
with tree grammars, the most popular measure of tree similarity, the
tree edit distance, was also used to compare the images. Eight different
types of tree edit distance measures were used in order to cover
the broad range of tree edit distance and tree edit distance approximation
methods. All the computer based similarity methods were
then correlated with the online similarity survey results, to determine
which ones more closely model perceptual similarity. The results were
then analysed in the light of some modern psychological theories of
perceptual similarity.
This work represents a novel approach to the Passfaces type of visual
password schemes using dynamically generated pass-images and their
highly similar distractors, instead of static pictures stored in an online
database. The results of the online survey were then accurately
modelled using the most suitable tree edit distance measure, in order
to automate the determination of similarity of our generated distractor
images. The information gathered from our various experiments
was then used in the design of a prototype visual password scheme.
The generated images were similar, but not identical, in order to defeat
shoulder surfing. This approach overcomes the following problems
with this category of visual password schemes: shoulder surfing,
bias in image selection, selection of easy to guess pictures and infrastructural
limitations like large picture databases, network speed and
database security issues. The resulting prototype developed is highly
secure, resilient to shoulder surfing and easy for humans to use, and
overcomes the aforementioned limitations in this category of visual
password schemes.
|
262 |
Contextual Modulation of Competitive Object Candidates in Early Object RecognitionUnknown Date (has links)
Object recognition is imperfect; often incomplete processing or deprived
information yield misperceptions (i.e., misidentification) of objects. While quickly
rectified and typically benign, instances of such errors can produce dangerous
consequences (e.g., police shootings). Through a series of experiments, this study
examined the competitive process of multiple object interpretations (candidates) during
the earlier stages of object recognition process using a lexical decision task paradigm.
Participants encountered low-pass filtered objects that were previously demonstrated to
evoke multiple responses: a highly frequented interpretation (“primary candidates”) and a
lesser frequented interpretation (“secondary candidates”). When objects were presented
without context, no facilitative effects were observed for primary candidates. However,
secondary candidates demonstrated evidence for being actively suppressed. / Includes bibliography. / Thesis (M.S.)--Florida Atlantic University, 2017. / FAU Electronic Theses and Dissertations Collection
|
263 |
Learning to match faces and voicesUnknown Date (has links)
This study examines whether forming a single identity is crucial to learning to bind faces and voices, or if people are equally able to do so without tying this information to an identity. To test this, individuals learned paired faces and voices that were in one of three different conditions: True voice, Gender Matched, or Gender Mismatched conditions. Performance was measured in a training phase as well as a test phase, and results show that participants were able to learn more quickly and have higher overall performance for learning in the True Voice and Gender Matched conditions. During the test phase, performance was almost at chance in the Gender Mismatched condition which may mean that learning in the training phase was simply memorization of the pairings for this condition. Results support the hypothesis that learning to bind faces and voices is a process that involves forming a supramodal identity from multisensory learning. / by Meredith Davidson. / Thesis (M.A.)--Florida Atlantic University, 2010. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2010. Mode of access: World Wide Web.
|
264 |
Automated biometrics of audio-visual multiple modalsUnknown Date (has links)
Biometrics is the science and technology of measuring and analyzing biological data for authentication purposes. Its progress has brought in a large number of civilian and government applications. The candidate modalities used in biometrics include retinas, fingerprints, signatures, audio, faces, etc. There are two types of biometric system: single modal systems and multiple modal systems. Single modal systems perform person recognition based on a single biometric modality and are affected by problems like noisy sensor data, intra-class variations, distinctiveness and non-universality. Applying multiple modal systems that consolidate evidence from multiple biometric modalities can alleviate those problems of single modal ones. Integration of evidence obtained from multiple cues, also known as fusion, is a critical part in multiple modal systems, and it may be consolidated at several levels like feature fusion level, matching score fusion level and decision fusion level. Among biometric modalities, both audio and face modalities are easy to use and generally acceptable by users. Furthermore, the increasing availability and the low cost of audio and visual instruments make it feasible to apply such Audio-Visual (AV) systems for security applications. Therefore, this dissertation proposes an algorithm of face recognition. In addition, it has developed some novel algorithms of fusion in different levels for multiple modal biometrics, which have been tested by a virtual database and proved to be more reliable and robust than systems that rely on a single modality. / by Lin Huang. / Thesis (Ph.D.)--Florida Atlantic University, 2010. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2010. Mode of access: World Wide Web.
|
265 |
Proud elastic target discrimination using low-frequency sonar signaturesUnknown Date (has links)
This thesis presents a comparative analysis of various low-frequency sonar signature representations and their ability to discriminate between proud targets of varying physical parameters. The signature representations used include: synthetic aperture sonar (SAS) beamformed images, acoustic color plot images, and bispectral images. A relative Mean-Square Error (rMSE) performance metric and an effective Signal-to-Noise Ratio (SNReff) performance metric have been developed and implemented to quantify the target differentiation. The analysis is performed on a subset of the synthetic sonar stave data provided by the Naval Surface Warfare Center - Panama City Division (NSWC-PCD). The subset is limited to aluminum and stainless steel, thin-shell, spherical targets in contact with the seafloor (proud). It is determined that the SAS signature representation provides the best, least ambiguous, target differentiation with a minimum mismatch difference of 14.5802 dB. The acoustic color plot and bispectrum representations resulted in a minimum difference of 9.1139 dB and 1.8829 dB, respectively / by Brenton Mallen. / Thesis (M.S.C.S.)--Florida Atlantic University, 2012. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2012. Mode of access: World Wide Web.
|
266 |
Sistema de visão computacional sobre processadores com arquitetura multi núcleos. / System of computational vision over multicore architecture processors.Hiramatsu, Roberto Kenji 20 May 2008 (has links)
Esta tese apresenta um estudo sobre a implementação de sistema de detecção e reconhecimento de faces no processador CELL na plataforma CBE, utilizando um sistema Playstation 3. Inicialmente, diversas abordagens para reconhecimento e detecção de faces são estudadas, bem como arquiteturas de processador multi núcleos. São apresentadas três implementação, sendo a segunda implementação premiada com quarto colocado no IBM CELL UNIVERSITY CHALLENGE 2007 para desenvolvimento de programas para plataforma Cell BE. A terceira implementação apresenta os resultados interessantes relacionados a vetorização do processamento dos dados da detecção de objetos e os recursos adotados para obter o melhor desempenho. / This thesis presents a study of face detection implementation on CBE plataform and employ the system with Playstation 3 hardware. Several approaches for face detection and recognition are studied as well as multicore processor architetures. We implemented three versions of system. First implementation was a naive reference implementation with worst performance. Second implementation granted fourth prize in IBM CELL UNIVERSITY CHALLENGE 2007 that incentive development on CBE plataform. Third implementation had most interesting results with vectorized approaches on code of object detection.
|
267 |
Peripheral Object Recognition in Naturalistic ScenesUnknown Date (has links)
Most of the human visual field falls in the periphery, and peripheral processing is
important for normal visual functioning. Yet, little is known about peripheral object
recognition in naturalistic scenes and factors that modulate this ability. We propose that
a critical function of scene and object memory is in order to facilitate visual object
recognition in the periphery. In the first experiment, participants identified objects in
scenes across different levels of familiarity and contextual information within the scene.
We found that familiarity with a scene resulted in a significant increase in the distance
that objects were recognized. Furthermore, we found that a semantically consistent scene
improved the distance that object recognition is possible, supporting the notion that
contextual facilitation is possible in the periphery. In the second experiment, the preview
duration of a scene was varied in order to examine how a scene representation is built and
how memory of that scene and the objects within it contributes to object recognition in
the periphery. We found that the closer participants fixated to the object in the preview,
the farther on average they recognized that target object in the periphery. However, only a preview duration of the scenes for 5000 ms produced significantly farther peripheral
object recognition compared to not previewing the scene. Overall, these experiments
introduce a novel research paradigm for object recognition in naturalistic scenes, and
demonstrates multiple factors that have systematic effects on peripheral object
recognition. / Includes bibliography. / Dissertation (Ph.D.)--Florida Atlantic University, 2016. / FAU Electronic Theses and Dissertations Collection
|
268 |
Signature system for video identificationUnknown Date (has links)
Video signature techniques based on tomography images address the problem of video identification. This method relies on temporal segmentation and sampling strategies to build and determine the unique elements that will form the signature. In this thesis an extension for these methods is presented; first a new feature extraction method, derived from the previously proposed sampling pattern, is implemented and tested, resulting in a highly distinctive set of signature elements, second a robust temporal video segmentation system is used to replace the original method applied to determine shot changes more accurately. Under a very exhaustive set of tests the system was able to achieve 99.58% of recall, 100% of precision and 99.35% of prediction precision. / by Sebastian Possos Medellin. / Thesis (M.S.C.S.)--Florida Atlantic University, 2010. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2010. Mode of access: World Wide Web.
|
269 |
A novel NN paradigm for the prediction of hematocrit value during blood transfusionUnknown Date (has links)
During the Leukocytapheresis (LCAP) process used to treat patients suffering from acute Ulcerative Colitis, medical practitioners have to continuously monitor the Hematocrit (Ht) level in the blood to ensure it is within the acceptable range. The work done, as a part of this thesis, attempts to create an early warning system that can be used to predict if and when the Ht values will deviate from the acceptable range. To do this we have developed an algorithm based on the Group Method of Data Handling (GMDH) and compared it to other Neural Network algorithms, in particular the Multi Layer Perceptron (MLP). The standard GMDH algorithm captures the fluctuation very well but there is a time lag that produces larger errors when compared to MLP. To address this drawback we modified the GMDH algorithm to reduce the prediction error and produce more accurate results. / by Jay Thakkar. / Pagination error. "References" should be leaves 63-67, and pagination end with leaf 67. / Thesis (M.S.C.S.)--Florida Atlantic University, 2011. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2011. Mode of access: World Wide Web.
|
270 |
Patterns for secure interactions in social networks in Web 2.0Unknown Date (has links)
A social network is a structure of individuals and organizations, which are connected by one or more types of interdependency, such as friendship, affinity, common interests or knowledge. Social networks use Web 2.0 technology, which is mostly based on a service-oriented architecture. We are studying patterns for social networks in this environment. A pattern is an encapsulated solution to a software problem in a given context, secure threats are possible in this context. We present a collection of patterns associated with the most important aspects of social networks, with emphasis on controlling the actions of the users of these networks. / by Carolina Marina. / Thesis (M.S.C.S.)--Florida Atlantic University, 2012. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2012. Mode of access: World Wide Web.
|
Page generated in 0.0958 seconds