Ganprintr: Improved fakes and evaluation of the state of the art in face manipulation detection

JC Neves, R Tolosana… - IEEE Journal of …, 2020 - ieeexplore.ieee.org
The availability of large-scale facial databases, together with the remarkable progresses of
deep learning technologies, in particular Generative Adversarial Networks (GANs), have led …

A review of state-of-the-art in Face Presentation Attack Detection: From early development to advanced deep learning and multi-modal fusion methods

F Abdullakutty, E Elyan, P Johnston - Information fusion, 2021 - Elsevier
Face Recognition is considered one of the most common biometric solutions these days and
is widely used across a range of devices for various security purposes. The performance of …

Biometrics: Trust, but verify

AK Jain, D Deb, JJ Engelsma - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Over the past two decades, biometric recognition has exploded into a plethora of different
applications around the globe. This proliferation can be attributed to the high levels of …

[图书][B] Handbook of fingerprint recognition

D Maltoni, D Maio, AK Jain, S Prabhakar - 2009 - Springer
Biometric recognition, or simply biometrics, refers to the use of distinctive anatomical and/or
behavioral characteristics or identifiers (eg, fingerprints, face, iris, voice, and hand geometry) …

Deep models and shortwave infrared information to detect face presentation attacks

G Heusch, A George, D Geissbühler… - … and Identity Science, 2020 - ieeexplore.ieee.org
This paper addresses the problem of face presentation attack detection using different
image modalities. In particular, the usage of short wave infrared (SWIR) imaging is …

[HTML][HTML] Mobile behavioral biometrics for passive authentication

G Stragapede, R Vera-Rodriguez, R Tolosana… - Pattern Recognition …, 2022 - Elsevier
Current mobile user authentication systems based on PIN codes, fingerprint, and face
recognition have several shortcomings. Such limitations have been addressed in the …

DeepSign: Deep on-line signature verification

R Tolosana, R Vera-Rodriguez, J Fierrez… - … and Identity Science, 2021 - ieeexplore.ieee.org
Deep learning has become a breathtaking technology in the last years, overcoming
traditional handcrafted approaches and even humans for many different tasks. However, in …

Fingerprint spoof detector generalization

T Chugh, AK Jain - IEEE Transactions on Information Forensics …, 2020 - ieeexplore.ieee.org
We present a style-transfer based wrapper, called Universal Material Generator (UMG), to
improve the generalization performance of any fingerprint spoof (presentation attack) …

Ecg biometric recognition: Review, system proposal, and benchmark evaluation

P Melzi, R Tolosana, R Vera-Rodriguez - IEEE Access, 2023 - ieeexplore.ieee.org
ECGs have shown unique patterns to distinguish between different subjects and present
important advantages compared to other biometric traits. However, the lack of public data …

Fingerprint presentation attack detection based on local features encoding for unknown attacks

LJ Gonzalez-Soler, M Gomez-Barrero, L Chang… - IEEE …, 2021 - ieeexplore.ieee.org
Fingerprint-based biometric systems have experienced a large development in the past. In
spite of many advantages, they are still vulnerable to attack presentations (APs). Therefore …