Interchangeability in automated corneal diameter measurements across different biometric devices: a systematic review of agreement studies

M Muzyka-Woźniak, S Woźniak… - Journal of Refractive …, 2024 - journals.healio.com
Purpose: To provide an up-to-date review of the agreement in automated white-to-white
(WTW) measurement between the latest topographic and biometric devices. Methods: In this …

Synthesizing Iris Images using Generative Adversarial Networks: Survey and Comparative Analysis

S Yadav, A Ross - arXiv preprint arXiv:2404.17105, 2024 - arxiv.org
Biometric systems based on iris recognition are currently being used in border control
applications and mobile devices. However, research in iris recognition is stymied by various …

[HTML][HTML] Signal enhancement and efficient DTW-based comparison for wearable gait recognition

D Avola, L Cinque, M De Marsico, A Fagioli… - Computers & …, 2024 - Elsevier
The popularity of biometrics-based user identification has significantly increased over the
last few years. User identification based on the face, fingerprints, and iris, usually achieves …

Toward Large-Scale Palmprint Image Analysis by a Rich Orientation Code

D Fan, X Liang, W Jia, D Zhang - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Palmprint recognition has gained considerable attention in recent years, accompanied by
significant progress. However, large-scale palmprint recognition, which holds great potential …

基于深度学习的虹膜识别研究综述.

江健, 张琪, 王财勇 - … of Frontiers of Computer Science & …, 2024 - search.ebscohost.com
虹膜识别技术以其卓越的精确性, 安全性和稳定性等特点著称. 当前的虹膜识别系统在约束用户
状态和采集设备的条件下展现出较为稳定的性能, 但是无法适应目前复杂多样的开放场景 …

Principles of Designing Robust Remote Face Anti-Spoofing Systems

X Xu, T Zhao, Z Zhang, Z Li, J Wu, A Achille… - arXiv preprint arXiv …, 2024 - arxiv.org
Protecting digital identities of human face from various attack vectors is paramount, and face
anti-spoofing plays a crucial role in this endeavor. Current approaches primarily focus on …

Customized iris feature extraction for intruder detection system to maximize detection rate using PCA algorithm in comparison with ICA algorithm

T Bhargav, B Balachander - AIP Conference Proceedings, 2024 - pubs.aip.org
The objective of this project is to acquire features of iris texture using Independent
component analysis (ICA) for the purpose of novel intruder detection and comparison to …

[PDF][PDF] Mobile Device Background Sensors: Authentication vs Privacy

P Delgado de Santos - 2024 - kar.kent.ac.uk
The increasing number of mobile devices in recent years has caused the collection of a
large amount of personal information that needs to be protected. To this aim, be-havioural …