Accurate face recognition systems are increasingly important in sensitiv...
Traditional minutiae-based fingerprint representations consist of a
vari...
Face Morphing Attacks pose a threat to the security of identity document...
This paper proposes an explainable visualisation of different face featu...
Nowadays, Presentation Attack Detection is a very active research area.
...
Latent fingerprints are among the most important and widely used evidenc...
Quality assessment algorithms can be used to estimate the utility of a
b...
Today, deep learning represents the most popular and successful form of
...
Evaluating the quality of facial images is essential for operating face
...
In this paper, we benchmark several cancelable biometrics (CB) schemes o...
Lossy face image compression can degrade the image quality and the utili...
Many applications such as forensics, surveillance, satellite imaging, me...
Currently, it is ever more common to access online services for activiti...
Iris Recognition (IR) is one of the market's most reliable and accurate
...
Non-referential face image quality assessment methods have gained popula...
This research proposes a new database and method to detect the reduction...
This research proposes a method to detect alcohol consumption from
Near-...
Deep neural networks have become prevalent in human analysis, boosting t...
The vast progress in synthetic image synthesis enables the generation of...
Face morphing attack detection is challenging and presents a concrete an...
Privacy-enhancing technologies are technologies that implement fundament...
In security systems the risk assessment in the sense of common criteria
...
While several works have studied the vulnerability of automated FRS and ...
This work investigates the impact of fun selfie filters, which are frequ...
Systems that analyse faces have seen significant improvements in recent ...
We investigate the potential of fusing human examiner decisions for the ...
In recent years, increasing deployment of face recognition technology in...
Doppelgängers (or lookalikes) usually yield an increased probability of
...
Enabling highly secure applications (such as border crossing) with face
...
Removing the background in ID Card images is a real challenge for remote...
Face morphing attacks can compromise Face Recognition System (FRS) by
ex...
The robustness and generalization ability of Presentation Attack Detecti...
Face morphing attack detection is a challenging task. Automatic
classifi...
We present the first method for synthetic generation of contactless
fing...
Due to their convenience and high accuracy, face recognition systems are...
Smartphones have been employed with biometric-based verification systems...
Biometric systems are vulnerable to the Presentation Attacks (PA) perfor...
Computationally efficient, accurate, and privacy-preserving data storage...
This paper proposes a new framework to detect, segment, and estimate the...
Recently, different researchers have found that the gallery composition ...
Algorithmic decision systems have frequently been labelled as "biased",
...
Iris pattern recognition has significantly improved the biometric
authen...
Face verification has come into increasing focus in various applications...
In the past years, face recognition technologies have shown impressive
r...
The growing scope, scale, and number of biometric deployments around the...
In the past years, numerous methods have been introduced to reliably det...
This work presents an automated touchless fingerprint recognition system...
In the last decades, the broad development experienced by biometric syst...
Since early 2020 the COVID-19 pandemic has had a considerable impact on ...
Selfie-based biometrics has great potential for a wide range of applicat...