No abstract available.
Cited By
- Diaz M, Ferrer M and Vessio G (2024). Explainable offline automatic signature verifier to support forensic handwriting examiners, Neural Computing and Applications, 36:5, (2411-2427), Online publication date: 1-Feb-2024.
- Ghosh S, Dhall A, Hayat M, Knibbe J and Ji Q (2024). Automatic Gaze Analysis: A Survey of Deep Learning Based Approaches, IEEE Transactions on Pattern Analysis and Machine Intelligence, 46:1, (61-84), Online publication date: 1-Jan-2024.
- Ruan S, Li Y and Qin H (2024). LSFM: Light Style and Feature Matching for Efficient Cross-Domain Palmprint Recognition, IEEE Transactions on Information Forensics and Security, 19, (9598-9612), Online publication date: 1-Jan-2024.
- Zhang L, Tan S, Chen Y and Yang J (2023). A Phoneme Localization Based Liveness Detection for Text-Independent Speaker Verification, IEEE Transactions on Mobile Computing, 22:10, (5611-5624), Online publication date: 1-Oct-2023.
- Chen X, Zhang L and Liu J (2023). Verifiable Homomorphic Secret Sharing for Low Degree Polynomials, IEEE Transactions on Dependable and Secure Computing, 20:4, (2882-2895), Online publication date: 1-Jul-2023.
- Chen X and Zhang L (2023). Publicly Verifiable Homomorphic Secret Sharing for Polynomial Evaluation, IEEE Transactions on Information Forensics and Security, 18, (4609-4624), Online publication date: 1-Jan-2023.
- Acar A, Aksu H, Uluagac A and Akkaya K (2021). A Usable and Robust Continuous Authentication Framework Using Wearables, IEEE Transactions on Mobile Computing, 20:6, (2140-2153), Online publication date: 1-Jun-2021.
- Yousefi F, Kolivand H and Baker T (2021). SaS-BCI: a new strategy to predict image memorability and use mental imagery as a brain-based biometric authentication, Neural Computing and Applications, 33:9, (4283-4297), Online publication date: 1-May-2021.
- Chaudhary G and Srivastava S (2019). A robust 2D-Cochlear transform-based palmprint recognition, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 24:3, (2311-2328), Online publication date: 1-Feb-2020.
- Gui Q, Ruiz-Blondet M, Laszlo S and Jin Z (2019). A Survey on Brain Biometrics, ACM Computing Surveys, 51:6, (1-38), Online publication date: 30-Nov-2019.
- Wan C, Wang L and Phoha V (2018). A Survey on Gait Recognition, ACM Computing Surveys, 51:5, (1-35), Online publication date: 30-Sep-2019.
- Sawant M and Bhurchandi K (2019). Age invariant face recognition, Artificial Intelligence Review, 52:2, (981-1008), Online publication date: 1-Aug-2019.
- Hu H, Chen D and Zheng J Online Handwriting Signature Verification Based on Template Clustering Proceedings of the 2019 3rd International Workshop on Education, Big Data and Information Technology, (129-135)
- Youbi Z, Boubchir L and Boukrouche A (2019). Human ear recognition based on local multi-scale LBP features with city-block distance, Multimedia Tools and Applications, 78:11, (14425-14441), Online publication date: 1-Jun-2019.
- Traore I, Alshahrani M and Obaidat M (2019). State of the art and perspectives on traditional and emerging biometrics, Security and Privacy, 1:6, Online publication date: 1-Jan-2019.
- Douglas M, Bailey K, Leeney M and Curran K (2018). An overview of steganography techniques applied to the protection of biometric data, Multimedia Tools and Applications, 77:13, (17333-17373), Online publication date: 1-Jul-2018.
- Blue L, Vargas L and Traynor P Hello, Is It Me You're Looking For? Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, (123-133)
- Liu S, Xu G, Zhang Y and Li W A Study of Temporal Stability on Finger-Vein Recognition Accuracy Using a Steady-State Model Proceedings of the 2018 10th International Conference on Bioinformatics and Biomedical Technology, (7-12)
- Kumar M, Prasad M and Raju U Iris Template Protection using Discrete Logarithm Proceedings of the 2018 2nd International Conference on Biometric Engineering and Applications, (43-49)
- Kumar M, Prasad M and Raju U Cancellable Fingerprint Template Generation Using Rectangle-Based Adjoining Minutiae Pairs Proceedings of the 2018 2nd International Conference on Biometric Engineering and Applications, (30-37)
- Dai H, Pears N and Smith W A Data-Augmented 3D Morphable Model of the Ear 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018), (404-408)
- Loukhaoukha K, Refaey A, Zebbiche K and Shami A (2018). Efficient and secure cryptosystem for fingerprint images in wavelet domain, Multimedia Tools and Applications, 77:8, (9325-9339), Online publication date: 1-Apr-2018.
- Banerjee A, Basu S, Basu S and Nasipuri M (2018). ARTeM, Multimedia Tools and Applications, 77:5, (5857-5884), Online publication date: 1-Mar-2018.
- Neha and Chatterjee K (2017). An Efficient Biometric Based Remote User Authentication Technique for Multi-server Environment, Wireless Personal Communications: An International Journal, 97:3, (4729-4745), Online publication date: 1-Dec-2017.
- Chandra S and Maheshkar S (2017). Verification of static signature pattern based on random subspace, REP tree and bagging, Multimedia Tools and Applications, 76:18, (19139-19171), Online publication date: 1-Sep-2017.
- Huang P, Li B, Guo L, Jin Z and Chen Y A Robust and Reusable ECG-Based Authentication and Data Encryption Scheme for eHealth Systems 2016 IEEE Global Communications Conference (GLOBECOM), (1-6)
- Peralta D, Triguero I, García S, Herrera F and Benitez J (2016). DPD-DFF, Information Fusion, 32:PA, (40-51), Online publication date: 1-Nov-2016.
- Zhang L, Tan S, Yang J and Chen Y VoiceLive Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, (1080-1091)
- Awad A (2016). From classical methods to animal biometrics, Computers and Electronics in Agriculture, 123:C, (423-435), Online publication date: 1-Apr-2016.
- Hayashi E, Maas M and Hong J Wave to me Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (3453-3462)
- Meraoumia A, Chitroub S and Bouridane A Efficient person identification by fusion of multiple palmprint representations Proceedings of the 4th international conference on Image and signal processing, (182-191)
- Janes R, Brandão A and Dias E (2010). A study on the available biometric technologies used in order to control security in physical access, WSEAS Transactions on Systems and Control, 5:6, (393-402), Online publication date: 1-Jun-2010.
- Radhika K, Sheela S, Venkatesha M and Sekhar G Multi-modal authentication using continuous dynamic programming Proceedings of the 2009 joint COST 2101 and 2102 international conference on Biometric ID management and multimodal communication, (228-235)
- Azizi A and Pourreza H A novel and efficient method to extract features and vector creation in iris recognition system Proceedings of the 32nd annual German conference on Advances in artificial intelligence, (114-122)
- Velisavljevic V (2009). Low-complexity iris coding and recognition based on directionlets, IEEE Transactions on Information Forensics and Security, 4:3, (410-417), Online publication date: 1-Sep-2009.
- Hwang S, Lee H and Cho S (2009). Improving authentication accuracy using artificial rhythms and cues for keystroke dynamics-based authentication, Expert Systems with Applications: An International Journal, 36:7, (10649-10656), Online publication date: 1-Sep-2009.
- Chang C, Lee J, Su Y, Huang P and Tu T (2009). Using empirical mode decomposition for iris recognition, Computer Standards & Interfaces, 31:4, (729-739), Online publication date: 1-Jun-2009.
- Amayeh G, Bebis G, Erol A and Nicolescu M (2009). Hand-based verification and identification using palm-finger segmentation and fusion, Computer Vision and Image Understanding, 113:4, (477-501), Online publication date: 1-Apr-2009.
- Abhyankar A and Schuckers S (2009). Integrating a wavelet based perspiration liveness check with fingerprint recognition, Pattern Recognition, 42:3, (452-464), Online publication date: 1-Mar-2009.
- Kekre H and Bharadi V Adaptive feature set updating algorithm for multimodal biometrics Proceedings of the International Conference on Advances in Computing, Communication and Control, (277-282)
- Vatsa M, Singh R and Noore A (2009). Unification of evidence-theoretic fusion algorithms, IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans, 39:1, (47-56), Online publication date: 1-Jan-2009.
- Vivaracho-Pascual C, Faundez-Zanuy M and Pascual J (2009). An efficient low cost approach for on-line signature recognition based on length normalization and fractional distances, Pattern Recognition, 42:1, (183-193), Online publication date: 1-Jan-2009.
- Fíbregas J and Faundez-Zanuy M (2008). Biometric dispersion matcher, Pattern Recognition, 41:11, (3412-3426), Online publication date: 1-Nov-2008.
- Bevilacqua V, Cariello L, Columbo D, Daleno D, Dellisanti Fabiano M, Giannini M, Mastronardi G and Castellano M Retinal Fundus Biometric Analysis for Personal Identifications Proceedings of the 4th international conference on Intelligent Computing: Advanced Intelligent Computing Theories and Applications - with Aspects of Artificial Intelligence, (1229-1237)
- Chen C and Peter Ho P (2008). Statistical pattern recognition in remote sensing, Pattern Recognition, 41:9, (2731-2741), Online publication date: 1-Sep-2008.
- Jain A, Nandakumar K and Nagar A (2008). Biometric template security, EURASIP Journal on Advances in Signal Processing, 2008, (1-17), Online publication date: 1-Jan-2008.
- Sirlantzis K, Hoque S and Fairhurst M (2008). Diversity in multiple classifier ensembles based on binary feature quantisation with application to face recognition, Applied Soft Computing, 8:1, (437-445), Online publication date: 1-Jan-2008.
- Choras R Feature extraction for CBIR and biometrics applications Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Computer Science - Volume 7, (1-9)
- Sun L, Pan G, Wu Z and Lao S Blinking-based live face detection using conditional random fields Proceedings of the 2007 international conference on Advances in Biometrics, (252-260)
- Atanassov K, Boumbarov O, Gluhchev G, Hadjitodorov S, Shannon A and Vassilev V A generalized net model of biometric access-control system Proceedings of the 9th WSEAS international conference on Automatic control, modelling and simulation, (78-81)
- Bengio S and Mariéthoz J Biometric person authentication is a multiple classifier problem Proceedings of the 7th international conference on Multiple classifier systems, (513-522)
- Buddharaju P, Pavlidis I, Tsiamyrtzis P and Bazakos M (2007). Physiology-Based Face Recognition in the Thermal Infrared Spectrum, IEEE Transactions on Pattern Analysis and Machine Intelligence, 29:4, (613-626), Online publication date: 1-Apr-2007.
- Faundez-Zanuy M (2007). On-line signature recognition based on VQ-DTW, Pattern Recognition, 40:3, (981-992), Online publication date: 1-Mar-2007.
- Poursaberi A and Araabi B (2007). Iris recognition for partially occluded images, EURASIP Journal on Advances in Signal Processing, 2007:1, (20-20), Online publication date: 1-Jan-2007.
- Dagher I, Kobersy W and Nader W (2007). Human hand recognition using IPCA-ICA algorithm, EURASIP Journal on Advances in Signal Processing, 2007:1, (77-77), Online publication date: 1-Jan-2007.
- Zhou J, Su G, Jiang C, Deng Y and Li C (2007). A face and fingerprint identity authentication system based on multi-route detection, Neurocomputing, 70:4-6, (922-931), Online publication date: 1-Jan-2007.
- Kong A, Zhang D and Kamel M (2006). Palmprint identification using feature-level fusion, Pattern Recognition, 39:3, (478-487), Online publication date: 1-Mar-2006.
- Chin C, Jin A and Ling D Iris verification based on Iris feature and secret pseudo-random number Proceedings of the 4th WSEAS International Conference on Electronic, Signal Processing and Control, (1-6)
- Hong L and Jain A (1998). Integrating Faces and Fingerprints for Personal Identification, IEEE Transactions on Pattern Analysis and Machine Intelligence, 20:12, (1295-1307), Online publication date: 1-Dec-1998.
Recommendations
Multi-factor biometrics for authentication: a false sense of security
MM&Sec '10: Proceedings of the 12th ACM workshop on Multimedia and securityMulti-factor biometric authentications have been proposed recently to strengthen security and/or privacy of biometric systems in addition to enhancing authentication accuracy. An important approach to multi-factor biometric authentication is to apply ...
Finger knuckle biometrics - A review
Display Omitted Describes the role of finger knuckle surface in biometric authentication.Enumerates various available open datasets for finger knuckle biometric trait.Presents different view point in the classification of various finger knuckle feature ...
Cancellable biometrics and annotations on BioHash
Lately, the once powerful one-factor authentication which is based solely on either password, token or biometric approach, appears to be insufficient in addressing the challenges of identity frauds. For example, the sole biometric approach suffers from ...