LM Dinca, GP Hancke - IEEE Access, 2017 - ieeexplore.ieee.org
Increasing operational and security demands changed biometrics by shifting the focus from single to multi-biometrics. Multi-biometrics are mandatory in the current context of large …
In recent decades, we have witnessed the evolution of biometric technology from the first pioneering works in face and voice recognition to the current state of development wherein a …
To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured physical synthetic sample, is a significant problem in biometric authentication, which …
A recent survey of iris biometric research from its inception through 2007, roughly 15 years of research, lists approximately 180 publications. This new survey is intended to update the …
This paper considers three issues that arise in creating an algorithm for the robust detection of textured contact lenses in iris recognition images. The first issue is whether the accurate …
This paper proposes a methodology for the utilization of eye movement cues for the task of iris print-attack detection. We investigate the fundamental distortions arising in the eye …
X Huang, C Ti, Q Hou, A Tokuta… - 2013 IEEE Workshop on …, 2013 - ieeexplore.ieee.org
As iris recognition systems have been deployed in many security areas, liveness detection that can distinguish between real iris patterns and fake ones becomes an important module …
R Agarwal, AS Jalal - Multimedia Tools and Applications, 2021 - Springer
The real-time solicitations of biometric systems have been extensively used for several things with the growing necessities of higher security level. There are numerous biometric …
Biometric presentation attack detection (PAD) is gaining increasing attention. Users of mobile devices find it more convenient to unlock their smart applications with finger, face, or …