The rapid evolution of high-end smartphones with advanced high-resolutio...
The vulnerabilities of fingerprint authentication systems have raised
se...
Face Recognition System (FRS) are shown to be vulnerable to morphed imag...
Face morphing attack detection is emerging as an increasingly challengin...
Latent fingerprints are among the most important and widely used evidenc...
Face morphing attacks have emerged as a potential threat, particularly i...
Fingerphoto images captured using a smartphone are successfully used to
...
Many applications such as forensics, surveillance, satellite imaging, me...
Face manipulation attacks have drawn the attention of biometric research...
Face Recognition Systems (FRS) are vulnerable to various attacks perform...
The technology of optical coherence tomography (OCT) to fingerprint imag...
The vast progress in synthetic image synthesis enables the generation of...
In this paper we present a novel self-supervised method to anticipate th...
While several works have studied the vulnerability of automated FRS and ...
Face Recognition systems (FRS) have been found vulnerable to morphing
at...
Enabling highly secure applications (such as border crossing) with face
...
Face morphing attacks can compromise Face Recognition System (FRS) by
ex...
The robustness and generalization ability of Presentation Attack Detecti...
An iris presentation attack detection (IPAD) is essential for securing
p...
Smartphones have been employed with biometric-based verification systems...
Biometric systems are vulnerable to the Presentation Attacks (PA) perfor...
Face morphing attacks aim at creating face images that are verifiable to...
Face verification has come into increasing focus in various applications...
Biometric recognition is a trending technology that uses unique
characte...
The vulnerability of Face Recognition System (FRS) to various kind of at...
Augmented and virtual reality is being deployed in different fields of
a...
Face morphing attacks target to circumvent Face Recognition Systems (FRS...
Face recognition (FR) systems have demonstrated outstanding verification...
The primary objective of face morphing is to combine face images of diff...
Face morphing attacks have raised critical concerns as they demonstrate ...
Morphing attacks have posed a severe threat to Face Recognition System (...
Fingerprint recognition systems are widely deployed in various real-life...
Biometric-based verification is widely employed on the smartphones for
v...
Despite the high biometric performance, finger-vein recognition systems ...
Face recognition is widely employed in Automated Border Control (ABC) ga...