Deep gait recognition: A survey

A Sepas-Moghaddam, A Etemad - IEEE transactions on pattern …, 2022 - ieeexplore.ieee.org
Gait recognition is an appealing biometric modality which aims to identify individuals based
on the way they walk. Deep learning has reshaped the research landscape in this area …

Multi-factor authentication: A survey

A Ometov, S Bezzateev, N Mäkitalo, S Andreev… - Cryptography, 2018 - mdpi.com
Today, digitalization decisively penetrates all the sides of the modern society. One of the key
enablers to maintain this process secure is authentication. It covers many different areas of a …

Biometric antispoofing methods: A survey in face recognition

J Galbally, S Marcel, J Fierrez - Ieee Access, 2014 - ieeexplore.ieee.org
In recent decades, we have witnessed the evolution of biometric technology from the first
pioneering works in face and voice recognition to the current state of development wherein a …

A survey on antispoofing schemes for fingerprint recognition systems

E Marasco, A Ross - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Several issues related to the vulnerability of fingerprint recognition systems to attacks have
been highlighted in the biometrics literature. One such vulnerability involves the use of …

Security evaluation of pattern classifiers under attack

B Biggio, G Fumera, F Roli - IEEE transactions on knowledge …, 2013 - ieeexplore.ieee.org
Pattern classification systems are commonly used in adversarial applications, like biometric
authentication, network intrusion detection, and spam filtering, in which data can be …

Fingerprint spoof buster: Use of minutiae-centered patches

T Chugh, K Cao, AK Jain - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
The primary purpose of a fingerprint recognition system is to ensure a reliable and accurate
user authentication, but the security of the recognition system itself can be jeopardized by …

Surveying the development of biometric user authentication on mobile phones

W Meng, DS Wong, S Furnell… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Designing reliable user authentication on mobile phones is becoming an increasingly
important task to protect users' private information and data. Since biometric approaches can …

Spoofing face recognition with 3D masks

N Erdogmus, S Marcel - IEEE transactions on information …, 2014 - ieeexplore.ieee.org
Spoofing is the act of masquerading as a valid user by falsifying data to gain an illegitimate
access. Vulnerability of recognition systems to spoofing attacks (presentation attacks) is still …

Spoofing in 2d face recognition with 3d masks and anti-spoofing with kinect

N Erdogmus, S Marcel - 2013 IEEE sixth international …, 2013 - ieeexplore.ieee.org
The problem of detecting face spoofing attacks (presentation attacks) has recently gained a
well-deserved popularity. Mainly focusing on 2D attacks forged by displaying printed photos …

Learning generalized deep feature representation for face anti-spoofing

H Li, P He, S Wang, A Rocha, X Jiang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we propose a novel framework leveraging the advantages of the
representational ability of deep learning and domain generalization for face spoofing …