Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Dario Maio is active.

Publication


Featured researches published by Dario Maio.


IEEE Transactions on Pattern Analysis and Machine Intelligence | 2002

FVC2000: fingerprint verification competition

Dario Maio; Davide Maltoni; Raffaele Cappelli; James L. Wayman; Anil K. Jain

Reliable and accurate fingerprint recognition is a challenging pattern recognition problem, requiring algorithms robust in many contexts. FVC2000 competition attempted to establish the first common benchmark, allowing companies and academic institutions to unambiguously compare performance and track improvements in their fingerprint recognition algorithms. Three databases were created using different state-of-the-art sensors and a fourth database was artificially generated; 11 algorithms were extensively tested on the four data sets. We believe that FVC2000 protocol, databases, and results will be useful to all practitioners in the field not only as a benchmark for improving methods, but also for enabling an unbiased evaluation of algorithms.


IEEE Transactions on Pattern Analysis and Machine Intelligence | 1997

Direct gray-scale minutiae detection in fingerprints

Dario Maio; Davide Maltoni

Most automatic systems for fingerprint comparison are based on minutiae matching. Minutiae are essentially terminations and bifurcations of the ridge lines that constitute a fingerprint pattern. Automatic minutiae detection is an extremely critical process, especially in low-quality fingerprints where noise and contrast deficiency can originate pixel configurations similar to minutiae or hide real minutiae. Several approaches have been proposed in the literature; although rather different from each other, all these methods transform fingerprint images into binary images. In this work we propose an original technique, based on ridge line following, where the minutiae are extracted directly from gray scale images. The results achieved are compared with those obtained through some methods based on image binarization. In spite of a greater conceptual complexity, the method proposed performs better both in terms of efficiency and robustness.


international conference on pattern recognition | 2002

FVC2002: Second Fingerprint Verification Competition

Dario Maio; Davide Maltoni; Raffaele Cappelli; James L. Wayman; Anil K. Jain

Two years after the first edition, a new Fingerprint Verification Competition (FVC2002) was organized by the authors, with the aim of determining the state-of-the-art in this challenging pattern recognition application. The experience and the feedback received from FVC2000 allowed the authors to improve the organization of FVC2002 and to capture the attention of a significantly higher number of academic and commercial organizations (33 algorithms were submitted). This paper discusses the FVC2002 database, the test protocol and the main differences between FVC2000 and FVC2002. The algorithm performance evaluation will be presented at the 16/sup th/ ICPR.


International Journal of Cooperative Information Systems | 1998

THE DIMENSIONAL FACT MODEL: A CONCEPTUAL MODEL FOR DATA WAREHOUSES

Matteo Golfarelli; Dario Maio; Stefano Rizzi

Data warehousing systems enable enterprise managers to acquire and integrate information from heterogeneous sources and to query very large databases efficiently. Building a data warehouse requires adopting design and implementation techniques completely different from those underlying operational information systems. Though most scientific literature on the design of data warehouses concerns their logical and physical models, an accurate conceptual design is the necessary foundations for building a DW which is well-documented and fully satisfies requirements. In this paper we formalize a graphical conceptual model for data warehouses, called Dimensional Fact model, and propose a semi-automated methodology to build it from the pre-existing (conceptual or logical) schemes describing the enterprise relational database. The representation of reality built using our conceptual model consists of a set of fact schemes whose basic elements are facts, measures, attributes, dimensions and hierarchies; other featur...


hawaii international conference on system sciences | 1998

Conceptual design of data warehouses from E/R schemes

Matteo Golfarelli; Dario Maio; Stefano Rizzi

Data warehousing systems enable enterprise managers to acquire and integrate information from heterogeneous sources and to query very large databases efficiently. Building a data warehouse requires adopting design and implementation techniques completely different from those underlying information systems. We present a graphical conceptual model for data warehouses, called Dimensional Fact model, and propose a semi-automated methodology to build it from the pre-existing entity/relationship schemes describing a database. Our conceptual model consists of tree-structured fact schemes whose basic elements are facts, attributes, dimensions and hierarchies; other features which may be represented on fact schemes are the additivity of fact attributes along dimensions, the optionality of dimension attributes and the existence of non-dimension attributes. Compatible fact schemes may be overlapped in order to relate and compare data. Fact schemes may be integrated with information of the conjectured workload, expressed in terms of query patterns, to be used as the input of a design phase whose output are the logical and physical schemes of the data warehouse.


Lecture Notes in Computer Science | 2004

FVC2004: Third Fingerprint Verification Competition

Dario Maio; Davide Maltoni; Raffaele Cappelli; James L. Wayman; Anil K. Jain

A new technology evaluation of fingerprint verification algorithms has been organized following the approach of the previous FVC2000 and FVC2002 evaluations, with the aim of tracking the quickly evolving state-of-the-art of fingerprint recognition systems. Three sensors have been used for data collection, including a solid state sweeping sensor, and two optical sensors of different characteristics. The competition included a new category dedicated to ”light” systems, characterized by limited computational and storage resources. This paper summarizes the main activities of the FVC2004 organization and provides a first overview of the evaluation. Results will be further elaborated and officially presented at the International Conference on Biometric Authentication (Hong Kong) on July 2004.


IEEE Transactions on Pattern Analysis and Machine Intelligence | 2007

Fingerprint Image Reconstruction from Standard Templates

Raffaele Cappelli; Alessandra Lumini; Dario Maio; Davide Maltoni

A minutiae-based template is a very compact representation of a fingerprint image, and for a long time, it has been assumed that it did not contain enough information to allow the reconstruction of the original fingerprint. This work proposes a novel approach to reconstruct fingerprint images from standard templates and investigates to what extent the reconstructed images are similar to the original ones (that is, those the templates were extracted from). The efficacy of the reconstruction technique has been assessed by estimating the success chances of a masquerade attack against nine different fingerprint recognition algorithms. The experimental results show that the reconstructed images are very realistic and that, although it is unlikely that they can fool a human expert, there is a high chance to deceive state-of-the-art commercial fingerprint recognition systems.


decision support systems | 1987

A modular user-oriented decision support for physical database design

Dario Maio; Claudio Sartori; Maria Rita Scalas

Abstract A decision support package for the design of indexes in a relational database environment is presented. It originates from the theoretical results collected inside the DATAID methodology. Its main features are a high level language user interface, an incremental description of the design environment, a forecasting of the execution I/O costs if the proposed solution is adopted and also a guidance for the access paths to be selected in the various operations.A successful knowledge management strategy identifies a firm’s key leverage points essential to achieve business results. These often reside in core business processes that may be re-engineered to capitalize on and expand organizational knowledge resources and capabilities. This case describes a 4-year initiative undertaken by IBM to re-engineer its customer relationship management process and capitalize on knowledge-based resources. The case illustrates the effective, integrated use of information technologies to improve the performance of both customers and IBM’s human experts by providing knowledge access and availability, acquiring and assembling knowledge, and disseminating knowledge to those who need to apply it. q 2001 Elsevier Science B.V. All rights reserved.


IEEE Transactions on Information Forensics and Security | 2006

Fake finger detection by skin distortion analysis

Athos Antonelli; Raffaele Cappelli; Dario Maio; Davide Maltoni

Attacking fingerprint-based biometric systems by presenting fake fingers at the sensor could be a serious threat for unattended applications. This work introduces a new approach for discriminating fake fingers from real ones, based on the analysis of skin distortion. The user is required to move the finger while pressing it against the scanner surface, thus deliberately exaggerating the skin distortion. Novel techniques for extracting, encoding and comparing skin distortion information are formally defined and systematically evaluated over a test set of real and fake fingers. The proposed approach is privacy friendly and does not require additional expensive hardware besides a fingerprint scanner capable of capturing and delivering frames at proper rate. The experimental results indicate the new approach to be a very promising technique for making fingerprint recognition systems more robust against fake-finger-based spoofing attempts


Pattern Recognition | 2000

Real-time face location on gray-scale static images

Dario Maio; Davide Maltoni

Abstract This work presents a new approach to automatic face location on gray-scale static images with complex backgrounds. In a first stage our technique approximately detects the image positions where the probability of finding a face is high; during the second stage the location accuracy of the candidate faces is improved and their existence is verified. The experimentation shows that the algorithm performs very well both in terms of detection rate (just one missed detection on 70 images) and of efficiency (about 13 images/s can be processed on Hardware Intel Pentium II 266 MHz).

Collaboration


Dive into the Dario Maio's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Anil K. Jain

Michigan State University

View shared research outputs
Top Co-Authors

Avatar

Paolo Palmieri

Delft University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge