
-
Face Morphing Attack Generation Detection: A Comprehensive Survey
The vulnerability of Face Recognition System (FRS) to various kind of at...
read it
-
On the Generalisation Capabilities of Fingerprint Presentation Attack Detection Methods in the Short Wave Infrared Domain
Nowadays, fingerprint-based biometric recognition systems are becoming i...
read it
-
Texture-based Presentation Attack Detection for Automatic Speaker Verification
Biometric systems are nowadays employed across a broad range of applicat...
read it
-
MIPGAN – Generating Robust and High Quality Morph Attacks Using Identity Prior Driven GAN
Face morphing attacks target to circumvent Face Recognition Systems (FRS...
read it
-
Face Image Quality Assessment: A Literature Survey
The performance of face analysis and recognition systems depends on the ...
read it
-
Anomaly Detection with Convolutional Autoencoders for Fingerprint Presentation Attack Detection
In recent years, the popularity of fingerprint-based biometric authentic...
read it
-
Can GAN Generated Morphs Threaten Face Recognition Systems Equally as Landmark Based Morphs? – Vulnerability and Detection
The primary objective of face morphing is to combine face images of diff...
read it
-
On the Influence of Ageing on Face Morph Attacks: Vulnerability and Detection
Face morphing attacks have raised critical concerns as they demonstrate ...
read it
-
Deep Learning-based Single Image Face Depth Data Enhancement
Face recognition can benefit from the utilization of depth data captured...
read it
-
Morphing Attack Detection – Database, Evaluation Platform and Benchmarking
Morphing attacks have posed a severe threat to Face Recognition System (...
read it
-
Detection of Makeup Presentation Attacks based on Deep Face Representations
Facial cosmetics have the ability to substantially alter the facial appe...
read it
-
Morton Filters for Superior Template Protection for Iris Recognition
We address the fundamental performance issues of template protection (TP...
read it
-
Deep Face Representations for Differential Morphing Attack Detection
The vulnerability of facial recognition systems to face morphing attacks...
read it
-
Smartphone Multi-modal Biometric Authentication: Database and Evaluation
Biometric-based verification is widely employed on the smartphones for v...
read it
-
Detecting Finger-Vein Presentation Attacks Using 3D Shape Diffuse Reflectance Decomposition
Despite the high biometric performance, finger-vein recognition systems ...
read it
-
Robust Morph-Detection at Automated Border Control Gate using Deep Decomposed 3D Shape and Diffuse Reflectance
Face recognition is widely employed in Automated Border Control (ABC) ga...
read it
-
Fingerprint Presentation Attack Detection Based on Local Features Encoding for Unknown Attacks
Fingerprint-based biometric systems have experienced a large development...
read it
-
Sex-Prediction from Periocular Images across Multiple Sensors and Spectra
In this paper, we provide a comprehensive analysis of periocular-based s...
read it
-
Relevant features for Gender Classification in NIR Periocular Images
Most gender classifications methods from NIR images have used iris infor...
read it
-
Biometric Presentation Attack Detection: Beyond the Visible Spectrum
The increased need for unattended authentication in multiple scenarios h...
read it
-
Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters
Data privacy is crucial when dealing with biometric data. Accounting for...
read it