A survey on ear biometrics

A Abaza, A Ross, C Hebert, MAF Harrison… - ACM computing surveys …, 2013 - dl.acm.org
Recognizing people by their ear has recently received significant attention in the literature.
Several reasons account for this trend: first, ear recognition does not suffer from some …

Soft biometrics for surveillance: an overview

DA Reid, S Samangooei, C Chen, MS Nixon… - Handbook of statistics, 2013 - Elsevier
Biometrics is the science of automatically recognizing people based on physical or
behavioral characteristics such as face, fingerprint, iris, hand, voice, gait, and signature …

Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition

J Galbally, S Marcel, J Fierrez - IEEE transactions on image …, 2013 - ieeexplore.ieee.org
To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured
synthetic or reconstructed sample is a significant problem in biometric authentication, which …

Joint sparse representation for robust multimodal biometrics recognition

S Shekhar, VM Patel, NM Nasrabadi… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Traditional biometric recognition systems rely on a single biometric signature for
authentication. While the advantage of using multiple sources of information for establishing …

Security and privacy in biometrics: towards a holistic approach

P Campisi - Security and privacy in biometrics, 2013 - Springer
Security and privacy in biometric systems have been traditionally seen as two requirements
hindering each other. Only in the recent past researchers have started investigating it as a …

Iris image reconstruction from binary templates: An efficient probabilistic approach based on genetic algorithms

J Galbally, A Ross, M Gomez-Barrero, J Fierrez… - Computer Vision and …, 2013 - Elsevier
A binary iriscode is a very compact representation of an iris image. For a long time it was
assumed that the iriscode did not contain enough information to allow for the reconstruction …

Privacy and data protection issues of biometric applications

EJ Kindt - A Comparative Legal Analysis, 2013 - Springer
The author of this book–an updated version of her Ph. D. dissertation at the Catholic
University of Leuven in Belgium–is clearly no stranger in the world of biometrics and …

The 2nd competition on counter measures to 2D face spoofing attacks

I Chingovska, J Yang, Z Lei, D Yi, SZ Li… - … on biometrics (ICB), 2013 - ieeexplore.ieee.org
As a crucial security problem, anti-spoofing in biometrics, and particularly for the face
modality, has achieved great progress in the recent years. Still, new threats arrive inform of …

A systematic review on keystroke dynamics

PH Pisani, AC Lorena - Journal of the Brazilian Computer Society, 2013 - Springer
Computing and communication systems have improved our way of life, but have also
contributed to an increased data exposure and, consequently, to identity theft. A possible …

Complex eye movement pattern biometrics: Analyzing fixations and saccades

CD Holland, OV Komogortsev - 2013 International conference …, 2013 - ieeexplore.ieee.org
This paper presents an objective evaluation of previously unexplored biometric techniques
utilizing patterns identifiable in human eye movements to distinguish individuals. The …