[PDF][PDF] Audio-visual automatic speech recognition: An overview

G Potamianos, C Neti, J Luettin… - Issues in visual and audio …, 2004 - academia.edu
We have made significant progress in automatic speech recognition (ASR) for well-defined
applications like dictation and medium vocabulary transaction processing tasks in relatively …

PrivacyNet: Semi-adversarial networks for multi-attribute face privacy

V Mirjalili, S Raschka, A Ross - IEEE Transactions on Image …, 2020 - ieeexplore.ieee.org
Recent research has established the possibility of deducing soft-biometric attributes such as
age, gender, and race from an individual's face image with high accuracy. However, this …

A survey on fingerprint minutiae-based local matching for verification and identification: Taxonomy and experimental evaluation

D Peralta, M Galar, I Triguero, D Paternain, S García… - Information …, 2015 - Elsevier
Fingerprint recognition has found a reliable application for verification or identification of
people in biometrics. Globally, fingerprints can be viewed as valuable traits due to several …

An introduction to biometric authentication systems

J Wayman, A Jain, D Maltoni, D Maio - Biometric systems: Technology …, 2005 - Springer
Immigration cards holding both passport number and measures of the user's hand [1];
fingerprints taken as a legal requirement for a driver license, but not stored anywhere on the …

Towards a continuous biometric system based on ECG signals acquired on the steering wheel

JR Pinto, JS Cardoso, A Lourenço, C Carreiras - Sensors, 2017 - mdpi.com
Electrocardiogram signals acquired through a steering wheel could be the key to seamless,
highly comfortable, and continuous human recognition in driving settings. This paper …

Semi-adversarial networks: Convolutional autoencoders for imparting privacy to face images

V Mirjalili, S Raschka, A Namboodiri… - … on Biometrics (ICB), 2018 - ieeexplore.ieee.org
In this paper, we design and evaluate a convolutional autoencoder that perturbs an input
face image to impart privacy to a subject. Specifically, the proposed autoencoder transforms …

EEG-based person identification through binary flower pollination algorithm

D Rodrigues, GFA Silva, JP Papa, AN Marana… - Expert Systems with …, 2016 - Elsevier
Electroencephalogram (EEG) signal presents a great potential for highly secure biometric
systems due to its characteristics of universality, uniqueness, and natural robustness to …

Joint attention network for finger vein authentication

J Huang, M Tu, W Yang, W Kang - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Finger vein, as an intrinsic trait, has received increasing attention from academia and
industry for its liveness detection ability and high security. However, the principle of vein …

Accelerometer-based speed-adaptive gait authentication method for wearable IoT devices

F Sun, C Mao, X Fan, Y Li - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
With the rapid development of wearable Internet of Things (WIoT) devices, a significant
amount of sensitive/private information collected by them poses a considerable challenge to …

End-to-end online writer identification with recurrent neural network

XY Zhang, GS Xie, CL Liu… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
Writer identification is an important topic for pattern recognition and artificial intelligence.
Traditional methods rely heavily on sophisticated hand-crafted features to represent the …