A high performance fingerprint liveness detection method based on quality related features

J Galbally, F Alonso-Fernandez, J Fierrez… - Future Generation …, 2012 - Elsevier
A new software-based liveness detection approach using a novel fingerprint
parameterization based on quality related features is proposed. The system is tested on a …

Soft biometric traits for continuous user authentication

K Niinuma, U Park, AK Jain - IEEE Transactions on information …, 2010 - ieeexplore.ieee.org
Most existing computer and network systems authenticate a user only at the initial login
session. This could be a critical security weakness, especially for high-security systems …

Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism

S Chiasson, E Stobert, A Forget… - IEEE transactions on …, 2011 - ieeexplore.ieee.org
This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical
password scheme, including usability and security evaluations, and implementation …

The multiscenario multienvironment biosecure multimodal database (BMDB)

J Ortega-Garcia, J Fierrez… - … on Pattern Analysis …, 2009 - ieeexplore.ieee.org
A new multimodal biometric database designed and acquired within the framework of the
European BioSecure Network of Excellence is presented. It is comprised of more than 600 …

On joint optimization of automatic speaker verification and anti-spoofing in the embedding space

A Gomez-Alanis, JA Gonzalez-Lopez… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Biometric systems are exposed to spoofing attacks which may compromise their security,
and voice biometrics based on automatic speaker verification (ASV), is no exception. To …

A system-driven taxonomy of attacks and defenses in adversarial machine learning

K Sadeghi, A Banerjee… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Machine Learning (ML) algorithms, specifically supervised learning, are widely used in
modern real-world applications, which utilize Computational Intelligence (CI) as their core …

[PDF][PDF] Biometrics of next generation: An overview

AK Jain, A Kumar - Second generation biometrics, 2010 - Citeseer
Prevailing methods of human identification based on credentials (identification documents
and PIN) are not able to meet the growing demands for stringent security in applications …

Identification using encrypted biometrics

M Haghighat, S Zonouz, M Abdel-Mottaleb - … 2013, York, UK, August 27-29 …, 2013 - Springer
Biometric identification is a challenging subject among computer vision scientists. The idea
of substituting biometrics for passwords has become more attractive after powerful …

User authentication through mouse dynamics

C Shen, Z Cai, X Guan, Y Du… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Behavior-based user authentication with pointing devices, such as mice or touchpads, has
been gaining attention. As an emerging behavioral biometric, mouse dynamics aims to …

Face recognition on consumer devices: Reflections on replay attacks

DF Smith, A Wiliem, BC Lovell - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Widespread deployment of biometric systems supporting consumer transactions is starting
to occur. Smart consumer devices, such as tablets and phones, have the potential to act as …