
Les travaux de recherche de cette thèse consistent à mettre en place des solutions performantes et légères permettant de répondre aux problèmes de sécurisation de produits sensibles. Motivé par une collaboration avec différents acteurs au sein du projet Nuc-Track,le développement d'un système de sécurité biométrique, possiblement multimodal, mènera à une étude sur différentes caractéristiques biométriques telles que le visage, les empreintes digitales et le réseau vasculaire. Cette thèse sera axée sur une adéquation algorithme et architecture, dans le but de minimiser la taille de stockage des modèles d'apprentissages tout en garantissant des performances optimales. Cela permettra leur stockage sur un support personnel, respectant ainsi les normes de vie privée.
Research of this thesis consists in setting up efficient and light solutions to answer the problems of securing sensitive products. Motivated by a collaboration with various stakeholders within the Nuc-Track project, the development of a biometric security system, possibly multimodal, will lead to a study on various biometric features such as the face, fingerprints and the vascular network. This thesis will focus on an algorithm and architecture matching, with the aim of minimizing the storage size of the learning models while guaranteeing optimal performances. This will allow it to be stored on a personal support, thus respecting privacy standards.
Machine Learning, [INFO.INFO-AI] Computer Science [cs]/Artificial Intelligence [cs.AI], Traitements d'images, Intruder detection, Deep Learning, Biometry, Algorithm/architecture matching, Image processing, [INFO.INFO-TI] Computer Science [cs]/Image Processing [eess.IV], Biométrie, Détection d'intrusion en zone surveillée, Adéquation algorithme/architecture, [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
Machine Learning, [INFO.INFO-AI] Computer Science [cs]/Artificial Intelligence [cs.AI], Traitements d'images, Intruder detection, Deep Learning, Biometry, Algorithm/architecture matching, Image processing, [INFO.INFO-TI] Computer Science [cs]/Image Processing [eess.IV], Biométrie, Détection d'intrusion en zone surveillée, Adéquation algorithme/architecture, [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
