Continuous authentication has been proposed as a possible approach for passive and seamless user authentication, using sensor data comprising biometric, behavioral, and …
Over the past two decades, biometric recognition has exploded into a plethora of different applications around the globe. This proliferation can be attributed to the high levels of …
In spite of the advantages of biometrics as an identity verification technology, some concerns have been raised due to the high sensitivity of biometric data: any information leakage …
VN Boddeti - 2018 IEEE 9th international conference on …, 2018 - ieeexplore.ieee.org
Face recognition technology has demonstrated tremendous progress over the past few years, primarily due to advances in representation learning. As we witness the widespread …
H Gunes, M Piccardi - 18th International conference on pattern …, 2006 - ieeexplore.ieee.org
To be able to develop and test robust affective multimodal systems, researchers need access to novel databases containing representative samples of human multi-modal …
The widespread deployment of multi-biometrics to authenticate users prompts the need for biometric systems with high recognition performance. Further, the biometric data, once …
Secure communications are provided between a user computing device and a server computing device. An enrollment request is received from a user computing device that is …
Biometrics is commonly used in many automated verification systems offering several advantages over traditional verification methods. Since biometric features are associated …
M Chen, X Liao, M Wu - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
Recent studies have shown that physiological signals such as heart beat and breathing can be remotely captured from human faces using a regular color camera under ambient light …