-
1
-
-
79959479743
-
Gait recognition
-
New York, NY, USA: Springer-Verlag
-
S. Sarkar and Z. Liu, "Gait recognition," in Handbook of Biometrics. New York, NY, USA: Springer-Verlag, 2008.
-
(2008)
Handbook of Biometrics
-
-
Sarkar, S.1
Liu, Z.2
-
2
-
-
35048818555
-
-
(Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag
-
P. Kasprowski and J. Ober, Eye Movements in Biometrics (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2004.
-
(2004)
Eye Movements in Biometrics
-
-
Kasprowski, P.1
Ober, J.2
-
3
-
-
33947505230
-
Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation
-
Apr.
-
S. Marcel and J. D. R. Millán, "Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation," IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, pp. 743-752, Apr. 2007.
-
(2007)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.29
, Issue.4
, pp. 743-752
-
-
Marcel, S.1
Millán, J.D.R.2
-
4
-
-
78149472443
-
Introduction to biometrics
-
Berlin, Germany: Springer-Verlag
-
A. K. Jain and A. Ross, "Introduction to biometrics," in Handbook of Biometrics. Berlin, Germany: Springer-Verlag, 2008.
-
(2008)
Handbook of Biometrics
-
-
Jain, A.K.1
Ross, A.2
-
5
-
-
1642298729
-
Best practices in testing and reporting performance
-
Middlesex, U.K., Tech. Rep. 14/02
-
A. J. Mansfield and J. L. Wayman, "Best practices in testing and reporting performance," Centre Math. Sci. Comput., Nat. Phys. Lab., Middlesex, U.K., Tech. Rep. 14/02, 2002.
-
(2002)
Centre Math. Sci. Comput., Nat. Phys. Lab.
-
-
Mansfield, A.J.1
Wayman, J.L.2
-
6
-
-
0036030112
-
Impact of artificial 'gummy' fingers on fingerprint systems
-
Apr.
-
T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino, "Impact of artificial 'gummy' fingers on fingerprint systems," Proc. SPIE, vol. 4677, pp. 275-285, Apr. 2002.
-
(2002)
Proc. SPIE
, vol.4677
, pp. 275-285
-
-
Matsumoto, T.1
Matsumoto, H.2
Yamada, K.3
Hoshino, S.4
-
7
-
-
84869773314
-
On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals
-
Aug.
-
F. Alegre, R. Vipperla, N. Evans, and B. Fauve, "On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals," in Proc. 20th Eur. Signal Process. Conf. (EUSIPCO), Aug. 2012, pp. 36-40.
-
(2012)
Proc. 20th Eur. Signal Process. Conf. (EUSIPCO)
, pp. 36-40
-
-
Alegre, F.1
Vipperla, R.2
Evans, N.3
Fauve, B.4
-
8
-
-
33744729468
-
-
(Biometrics). New York, NY, USA: Springer- Verlag
-
A. A. Ross, K. Nandakumar, and A. K. Jain, Handbook of Multibiometrics (Biometrics). New York, NY, USA: Springer-Verlag, 2006.
-
(2006)
Handbook of Multibiometrics
-
-
Ross, A.A.1
Nandakumar, K.2
Jain, A.K.3
-
9
-
-
67649116016
-
Introduction to multibiometrics
-
Berlin, Germany: Springer-Verlag
-
A. Ross, K. Nandakumar, and A. K. Jain, "Introduction to multibiometrics," in Handbook of Biometrics. Berlin, Germany: Springer-Verlag, 2008.
-
(2008)
Handbook of Biometrics
-
-
Ross, A.1
Nandakumar, K.2
Jain, A.K.3
-
11
-
-
84911109190
-
Liveness detection: Fingerprint
-
Berlin, Germany: Springer-Verlag
-
S. Schuckers, "Liveness detection: Fingerprint," in Encyclopedia of Biometrics. Berlin, Germany: Springer-Verlag, 2009, pp. 924-931.
-
(2009)
Encyclopedia of Biometrics
, pp. 924-931
-
-
Schuckers, S.1
-
12
-
-
80052972273
-
Increase the security of multibiometric systems by incorporating a spoofing detection algorithm in the fusion mechanism
-
E. Marasco, P. Johnson, C. Sansone, and S. Schuckers, "Increase the security of multibiometric systems by incorporating a spoofing detection algorithm in the fusion mechanism," in Proc. 10th Int. Conf. Multiple Classifier Syst., 2011, pp. 309-318.
-
(2011)
Proc. 10th Int. Conf. Multiple Classifier Syst.
, pp. 309-318
-
-
Marasco, E.1
Johnson, P.2
Sansone, C.3
Schuckers, S.4
-
13
-
-
84871977158
-
Combining match scores with liveness values in a fingerprint verification system
-
Sep.
-
E. Marasco, Y. Ding, and A. Ross, "Combining match scores with liveness values in a fingerprint verification system," in Proc. 5th IEEE Int. Conf. Biometrics, Theory, Appl. Syst., Sep. 2012, pp. 418-425.
-
(2012)
Proc. 5th IEEE Int. Conf. Biometrics, Theory, Appl. Syst.
, pp. 418-425
-
-
Marasco, E.1
Ding, Y.2
Ross, A.3
-
14
-
-
84884967629
-
Anti-spoofing in action: Joint operation with a verification system
-
Jun.
-
I. Chingovska, A. Anjos, and S. Marcel, "Anti-spoofing in action: Joint operation with a verification system," in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2013, pp. 98-104.
-
(2013)
Proc. IEEE Conf. Comput. Vis. Pattern Recognit.
, pp. 98-104
-
-
Chingovska, I.1
Anjos, A.2
Marcel, S.3
-
15
-
-
27744526744
-
Database, protocols and tools for evaluating score-level fusion algorithms in biometric authentication
-
Feb.
-
N. Poh and S. Bengio, "Database, protocols and tools for evaluating score-level fusion algorithms in biometric authentication," Pattern Recognit. J., vol. 39, no. 2, pp. 223-233, Feb. 2006.
-
(2006)
Pattern Recognit. J.
, vol.39
, Issue.2
, pp. 223-233
-
-
Poh, N.1
Bengio, S.2
-
16
-
-
0003684449
-
-
New York, NY, USA: Springer-Verlag
-
T. Hastie, R. Tibshirani, and J. H. Friedman, The Elements of Statistical Learning. New York, NY, USA: Springer-Verlag, 2001.
-
(2001)
The Elements of Statistical Learning
-
-
Hastie, T.1
Tibshirani, R.2
Friedman, J.H.3
-
17
-
-
84865011972
-
Preliminary studies on the Good, the Bad, and the Ugly face recognition challenge problem
-
Jun.
-
Y. M. Lui, D. Bolme, P. J. Phillips, J. R. Beveridge, and B. A. Draper, "Preliminary studies on the Good, the Bad, and the Ugly face recognition challenge problem," in Proc. IEEE Comput. Vis. Pattern Recognit. Workshops (CVPRW), Jun. 2012, pp. 9-16.
-
(2012)
Proc. IEEE Comput. Vis. Pattern Recognit. Workshops (CVPRW)
, pp. 9-16
-
-
Lui, Y.M.1
Bolme, D.2
Phillips, P.J.3
Beveridge, J.R.4
Draper, B.A.5
-
19
-
-
0033901151
-
The NIST 1999 speaker recognition evaluation-An overview
-
A. F. Martin and M. A. Przybocki, "The NIST 1999 speaker recognition evaluation-An overview," Digital Signal Process., vol. 10, nos. 1-3, pp. 1-18, 2000.
-
(2000)
Digital Signal Process.
, vol.10
, Issue.1-3
, pp. 1-18
-
-
Martin, A.F.1
Przybocki, M.A.2
-
20
-
-
42749099051
-
NIST speaker recognition evaluation chronicles-Part 2
-
Jun.
-
M. A. Przybocki, A. F. Martin, and A. N. Le, "NIST speaker recognition evaluation chronicles-Part 2," in Proc. IEEE Odyssey Speaker Lang. Recognit. Workshop, Jun. 2006, pp. 1-6.
-
(2006)
Proc. IEEE Odyssey Speaker Lang. Recognit. Workshop
, pp. 1-6
-
-
Przybocki, M.A.1
Martin, A.F.2
Le, A.N.3
-
21
-
-
85046873967
-
The DET curve in assessment of detection task performance
-
A. F. Martin et al., "The DET curve in assessment of detection task performance," in Proc. Eurospeech, 1997, pp. 1895-1898.
-
(1997)
Proc. Eurospeech
, pp. 1895-1898
-
-
Martin, A.F.1
-
22
-
-
47849133262
-
The expected performance curve
-
S. Bengio, J. Mariéthoz, and M. Keller, "The expected performance curve," in Proc. Int. Conf. Mach. Learn. (ICML), Workshop ROC Anal. Mach. Learn., 2005.
-
(2005)
Proc. Int. Conf. Mach. Learn. (ICML), Workshop ROC Anal. Mach. Learn.
-
-
Bengio, S.1
Mariéthoz, J.2
Keller, M.3
-
23
-
-
84873455380
-
Liveness assurance in face authentication
-
New York, NY, USA: Springer-Verlag
-
M. Wagner and G. Chetty, "Liveness assurance in face authentication," in Encyclopedia of Biometrics. New York, NY, USA: Springer-Verlag, 2009, pp. 924-931.
-
(2009)
Encyclopedia of Biometrics
, pp. 924-931
-
-
Wagner, M.1
Chetty, G.2
-
24
-
-
84911109188
-
Biometric liveness detection: Framework and metrics
-
P. Johnson et al., "Biometric liveness detection: Framework and metrics," in Proc. Int. Biometric Perform. Conf., 2012.
-
(2012)
Proc. Int. Biometric Perform. Conf.
-
-
Johnson, P.1
-
25
-
-
84871378005
-
Security and liveness, overview
-
New York, NY, USA: Springer-Verlag
-
A. Adler and S. Schuckers, "Security and liveness, overview," in Encyclopedia of Biometrics. New York, NY, USA: Springer-Verlag, 2009, pp. 1146-1152.
-
(2009)
Encyclopedia of Biometrics
, pp. 1146-1152
-
-
Adler, A.1
Schuckers, S.2
-
26
-
-
79952506172
-
Multimodal fusion vulnerability to non-zero effort (spoof) imposters
-
Dec.
-
P. A. Johnson, B. Tan, and S. Schuckers, "Multimodal fusion vulnerability to non-zero effort (spoof) imposters," in Proc. IEEE Int. Workshop Inf. Forensics Security, Dec. 2010, pp. 1-5.
-
(2010)
Proc. IEEE Int. Workshop Inf. Forensics Security
, pp. 1-5
-
-
Johnson, P.A.1
Tan, B.2
Schuckers, S.3
-
27
-
-
37849011664
-
On the vulnerability of fingerprint verification systems to fake fingerprints attacks
-
Oct.
-
J. Galbally-Herrero, J. Fierrez-Aguilar, J. D. Rodriguez-Gonzalez, F. Alonso-Fernandez, J. Ortega-Garcia, and M. Tapiador, "On the vulnerability of fingerprint verification systems to fake fingerprints attacks," in Proc. IEEE Int. Carnahan Conf. Security Technol., Oct. 2006, pp. 169-179.
-
(2006)
Proc. IEEE Int. Carnahan Conf. Security Technol.
, pp. 169-179
-
-
Galbally-Herrero, J.1
Fierrez-Aguilar, J.2
Rodriguez-Gonzalez, J.D.3
Alonso-Fernandez, F.4
Ortega-Garcia, J.5
Tapiador, M.6
-
28
-
-
77950300511
-
An evaluation of direct attacks using fake fingers generated from ISO templates
-
J. Galbally et al., "An evaluation of direct attacks using fake fingers generated from ISO templates," Pattern Recognit. Lett., vol. 31, no. 8, pp. 725-732, 2010.
-
(2010)
Pattern Recognit. Lett.
, vol.31
, Issue.8
, pp. 725-732
-
-
Galbally, J.1
-
30
-
-
59149087002
-
Direct attacks using fake images in iris verification
-
Berlin, Germany: Springer-Verlag, May
-
V. Ruiz-Albacete, P. Tome-Gonzalez, F. Alonso-Fernandez, J. Galbally, J. Fierrez, and J. Ortega-Garcia, "Direct attacks using fake images in iris verification," in Biometrics and Identity Management. Berlin, Germany: Springer-Verlag, May 2008, pp. 181-190.
-
(2008)
Biometrics and Identity Management
, pp. 181-190
-
-
Ruiz-Albacete, V.1
Tome-Gonzalez, P.2
Alonso-Fernandez, F.3
Galbally, J.4
Fierrez, J.5
Ortega-Garcia, J.6
-
31
-
-
67349227385
-
Robustness of multimodal biometric fusion methods against spoof attacks
-
R. N. Rodrigues, L. L. Ling, and V. Govindaraju, "Robustness of multimodal biometric fusion methods against spoof attacks," J. Vis. Lang. Comput., vol. 20, no. 3, pp. 169-179, 2009.
-
(2009)
J. Vis. Lang. Comput.
, vol.20
, Issue.3
, pp. 169-179
-
-
Rodrigues, R.N.1
Ling, L.L.2
Govindaraju, V.3
-
32
-
-
84455183041
-
Robustness analysis of likelihood ratio score fusion rule for multimodal biometric systems under spoof attacks
-
Oct.
-
Z. Akhtar, G. Fumera, G.-L. Marcialis, and F. Roli, "Robustness analysis of likelihood ratio score fusion rule for multimodal biometric systems under spoof attacks," in Proc. 45th IEEE Int. Carnahan Conf. Security Technol., Oct. 2011, pp. 237-244.
-
(2011)
Proc. 45th IEEE Int. Carnahan Conf. Security Technol.
, pp. 237-244
-
-
Akhtar, Z.1
Fumera, G.2
Marcialis, G.-L.3
Roli, F.4
-
33
-
-
84871393354
-
Bob: A free signal processing and machine learning toolbox for researchers
-
Nara, Japan, Oct.
-
A. Anjos et al., "Bob: A free signal processing and machine learning toolbox for researchers," in Proc. 20th ACM Conf. Multimedia (MM), Nara, Japan, Oct. 2012, pp. 1449-1452.
-
(2012)
Proc. 20th ACM Conf. Multimedia MM)
, pp. 1449-1452
-
-
Anjos, A.1
-
34
-
-
84869410843
-
On the effectiveness of local binary patterns in face anti-spoofing
-
Sep.
-
I. Chingovska, A. Anjos, and S. Marcel, "On the effectiveness of local binary patterns in face anti-spoofing," in Proc. 11th Int. Conf. Biometrics Special Interest Group, Sep. 2012, pp. 1-7.
-
(2012)
Proc. 11th Int. Conf. Biometrics Special Interest Group
, pp. 1-7
-
-
Chingovska, I.1
Anjos, A.2
Marcel, S.3
-
35
-
-
78149300210
-
Face liveness detection from a single image with sparse low rank bilinear discriminative model
-
X. Tan, Y. Li, J. Liu, and L. Jiang, "Face liveness detection from a single image with sparse low rank bilinear discriminative model," in Proc. Eur. Conf. Comput. Vis. (ECCV), 2010, pp. 504-517.
-
(2010)
Proc. Eur. Conf. Comput. Vis. (ECCV
, pp. 504-517
-
-
Tan, X.1
Li, Y.2
Liu, J.3
Jiang, L.4
-
36
-
-
84866777842
-
A face antispoofing database with diverse attacks
-
Apr.
-
Z. Zhiwei, J. Yan, S. Liu, Z. Lei, D. Yi, and S. Z. Li, "A face antispoofing database with diverse attacks," in Proc. 5th IAPR Int. Conf. Biometrics (ICB), Apr. 2012, pp. 26-31.
-
(2012)
Proc. 5th IAPR Int. Conf. Biometrics (ICB)
, pp. 26-31
-
-
Zhiwei, Z.1
Yan, J.2
Liu, S.3
Lei, Z.4
Yi, D.5
Li, S.Z.6
-
37
-
-
35248898353
-
Comparison of MLP and GMM classifiers for face verification on XM2VTS
-
F. Cardinaux, C. Sanderson, and S. Marcel, "Comparison of MLP and GMM classifiers for face verification on XM2VTS," in Proc. 4th Int. Conf. Audio-Video-Based Biometric Person Authentication (AVBPA), 2003, pp. 911-920.
-
(2003)
Proc. 4th Int. Conf. Audio-Video-Based Biometric Person Authentication (AVBPA)
, pp. 911-920
-
-
Cardinaux, F.1
Sanderson, C.2
Marcel, S.3
-
38
-
-
33745953205
-
Local Gabor binary pattern histogram sequence (LGBPHS): A novel non-statistical model for face representation and recognition
-
Oct.
-
W. Zhang et al., "Local Gabor binary pattern histogram sequence (LGBPHS): A novel non-statistical model for face representation and recognition," in Proc. 10th IEEE Int. Conf. Comput. Vis. (ICCV), vol. 1. Oct. 2005, pp. 786-791.
-
(2005)
Proc. 10th IEEE Int. Conf. Comput. Vis. (ICCV
, vol.1
, pp. 786-791
-
-
Zhang, W.1
-
39
-
-
0031187375
-
Face recognition by elastic bunch graph matching
-
Jul.
-
L. Wiskott, J.-M. Fellous, N. Kuiger, and C. von der Malsburg, "Face recognition by elastic bunch graph matching," IEEE Trans. Pattern Anal. Mach. Intell., vol. 19, no. 7, pp. 775-779, Jul. 1997.
-
(1997)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.19
, Issue.7
, pp. 775-779
-
-
Wiskott, L.1
Fellous, J.-M.2
Kuiger, N.3
Malsburg Der C.Von4
-
40
-
-
84867681952
-
Face recognition with disparity corrected Gabor phase differences
-
Lecture Notes in Computer Science 7552. Berlin, Germany: Springer-verlag
-
M. Günther, D. Haufe, and R. P. Würtz, "Face recognition with disparity corrected Gabor phase differences," in Artificial Neural Networks and Machine Learning (Lecture Notes in Computer Science), vol. 7552. Berlin, Germany: Springer-verlag, 2012, pp. 411-418.
-
(2012)
Artificial Neural Networks and Machine Learning
, pp. 411-418
-
-
Günther, M.1
Haufe, D.2
Würtz, R.P.3
-
41
-
-
84856092767
-
Inter-session variability modelling and joint factor analysis for face authentication
-
Oct.
-
R. Wallace, M. McLaren, C. McCool, and S. Marcel, "Inter-session variability modelling and joint factor analysis for face authentication," in Proc. IEEE Int. Joint Conf. Biometrics, Oct. 2011, pp. 1-8.
-
(2011)
Proc. IEEE Int. Joint Conf. Biometrics
, pp. 1-8
-
-
Wallace, R.1
McLaren, M.2
McCool, C.3
Marcel, S.4
-
42
-
-
84867708736
-
An open source framework for standardized comparisons of face recognition algorithms
-
Lecture Notes in Computer Science 7585. Berlin, Germany: Springer-Verlag
-
M. Günther, R. Wallace, and S. Marcel, "An open source framework for standardized comparisons of face recognition algorithms," in Computer Vision Workshops and Demonstrations (Lecture Notes in Computer Science), vol. 7585. Berlin, Germany: Springer-Verlag, 2012, pp. 547-556.
-
(2012)
Computer Vision Workshops and Demonstrations
, pp. 547-556
-
-
Günther, M.1
Wallace, R.2
Marcel, S.3
-
43
-
-
84862953522
-
Competition on counter measures to 2-D facial spoofing attacks
-
Washington, DC, USA, Oct.
-
M. M. Chakka et al., "Competition on counter measures to 2-D facial spoofing attacks," in Proc. IEEE Int. Joint Conf. Biometrics (IJCB), Washington, DC, USA, Oct. 2011, pp. 1-6.
-
(2011)
Proc. IEEE Int. Joint Conf. Biometrics (IJCB)
, pp. 1-6
-
-
Chakka, M.M.1
-
44
-
-
84875979935
-
LBP-TOP based countermeasure against face spoofing attacks
-
T. de Freitas Pereira, A. Anjos, J. M. De Martino, and S. Marcel, "LBP-TOP based countermeasure against face spoofing attacks," in Proc. Int. Workshop Comput. Vis. Local Binary Pattern Variants (ACCV), 2012, pp. 121-132.
-
(2012)
Proc. Int. Workshop Comput. Vis. Local Binary Pattern Variants (ACCV)
, pp. 121-132
-
-
Pereira Freitas, T.1
Anjos, A.2
De Martino, J.M.3
Marcel, S.4
-
45
-
-
84856101805
-
Counter-measures to photo attacks in face recognition: A public database and a baseline
-
Oct.
-
A. Anjos and S. Marcel, "Counter-measures to photo attacks in face recognition: A public database and a baseline," in Proc. Int. Joint Conf. Biometrics, Oct. 2011, pp. 1-7.
-
(2011)
Proc. Int. Joint Conf. Biometrics
, pp. 1-7
-
-
Anjos, A.1
Marcel, S.2
-
46
-
-
84887484112
-
Complementary countermeasures for detecting scenic face spoofing attacks
-
Jun.
-
J. Komulainen, A. Hadid, M. Pietikainen, A. Anjos, and S. Marcel, "Complementary countermeasures for detecting scenic face spoofing attacks," in Proc. IEEE Int. Conf. Biometrics Compendium (ICB), Jun. 2013, pp. 1-7.
-
(2013)
Proc. IEEE Int. Conf. Biometrics Compendium (ICB)
, pp. 1-7
-
-
Komulainen, J.1
Hadid, A.2
Pietikainen, M.3
Anjos, A.4
Marcel, S.5
-
47
-
-
84887498252
-
The 2nd competition on counter measures to 2D face spoofing attacks
-
Jun.
-
I. Chingovska et al., "The 2nd competition on counter measures to 2D face spoofing attacks," in Proc. Int. Conf. Biometrics, Jun. 2013, pp. 1-6.
-
Proc. Int. Conf. Biometrics
, vol.2013
, pp. 1-6
-
-
Chingovska, I.1
|