A survey on biometric authentication: Toward secure and privacy-preserving identification

Z Rui, Z Yan - IEEE access, 2018 - ieeexplore.ieee.org
In order to overcome the difficulty of password management and improve the usability of
authentication systems, biometric authentication has been widely studied and has attracted …

The fall of one, the rise of many: a survey on multi-biometric fusion methods

LM Dinca, GP Hancke - IEEE Access, 2017 - ieeexplore.ieee.org
Increasing operational and security demands changed biometrics by shifting the focus from
single to multi-biometrics. Multi-biometrics are mandatory in the current context of large …

Biometric antispoofing methods: A survey in face recognition

J Galbally, S Marcel, J Fierrez - Ieee Access, 2014 - ieeexplore.ieee.org
In recent decades, we have witnessed the evolution of biometric technology from the first
pioneering works in face and voice recognition to the current state of development wherein a …

A review of iris anti-spoofing

J Galbally, M Gomez-Barrero - 2016 4th international …, 2016 - ieeexplore.ieee.org
To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured
physical synthetic sample, is a significant problem in biometric authentication, which …

A survey of iris biometrics research: 2008–2010

KW Bowyer, KP Hollingsworth, PJ Flynn - Handbook of iris recognition, 2016 - Springer
A recent survey of iris biometric research from its inception through 2007, roughly 15 years
of research, lists approximately 180 publications. This new survey is intended to update the …

Robust detection of textured contact lenses in iris recognition using BSIF

JS Doyle, KW Bowyer - IEEE Access, 2015 - ieeexplore.ieee.org
This paper considers three issues that arise in creating an algorithm for the robust detection
of textured contact lenses in iris recognition images. The first issue is whether the accurate …

Eye movement-driven defense against iris print-attacks

I Rigas, OV Komogortsev - Pattern Recognition Letters, 2015 - Elsevier
This paper proposes a methodology for the utilization of eye movement cues for the task of
iris print-attack detection. We investigate the fundamental distortions arising in the eye …

An experimental study of pupil constriction for liveness detection

X Huang, C Ti, Q Hou, A Tokuta… - 2013 IEEE Workshop on …, 2013 - ieeexplore.ieee.org
As iris recognition systems have been deployed in many security areas, liveness detection
that can distinguish between real iris patterns and fake ones becomes an important module …

Presentation attack detection system for fake Iris: a review

R Agarwal, AS Jalal - Multimedia Tools and Applications, 2021 - Springer
The real-time solicitations of biometric systems have been extensively used for several
things with the growing necessities of higher security level. There are numerous biometric …

Deep convolutional neural networks for face and iris presentation attack detection: Survey and case study

Y Safaa El‐Din, MN Moustafa, H Mahdi - IET Biometrics, 2020 - Wiley Online Library
Biometric presentation attack detection (PAD) is gaining increasing attention. Users of
mobile devices find it more convenient to unlock their smart applications with finger, face, or …