Contactless hand biometrics for forensics: review and performance benchmark

LJ Gonzalez-Soler, KM Zyla, C Rathgeb… - EURASIP Journal on …, 2024 - Springer
Contactless hand biometrics has emerged as an alternative to traditional biometric
characteristics, eg, fingerprint or face, as it possesses distinctive properties that are of …

[HTML][HTML] A comprehensive survey of fingerprint presentation attack detection

K Karampidis, M Rousouliotis, E Linardos… - … , Security and Safety, 2021 - oaepublish.com
Nowadays, the number of people that utilize either digital applications or machines is
increasing exponentially. Therefore, trustworthy verification schemes are required to ensure …

On the generalisation capabilities of Fisher vector‐based face presentation attack detection

LJ González‐Soler, M Gomez‐Barrero… - IET Biometrics, 2021 - Wiley Online Library
In past decades, the broad development experienced by biometric systems has unveiled
several threats that may decrease their trustworthiness. These are attack presentations that …

Dehff–a hybrid approach based on distinctively encoded fingerprint features for live fingerprint detection

R Mehboob, H Dawood - Biomedical Signal Processing and Control, 2022 - Elsevier
Fingerprint-based biometric systems have elevated industrial standards worldwide through
rapid personal verification. The array of identity frauds and cyber-attacks have also …

On the effectiveness of impedance-based fingerprint presentation attack detection

J Kolberg, D Gläsner, R Breithaupt, M Gomez-Barrero… - Sensors, 2021 - mdpi.com
Within the last few decades, the need for subject authentication has grown steadily, and
biometric recognition technology has been established as a reliable alternative to …

An Interpretable Siamese Attention Res‐CNN for Fingerprint Spoofing Detection

C Yuan, Z Xu, X Li, Z Zhou, J Huang, P Guo - IET Biometrics, 2024 - Wiley Online Library
In recent years, fingerprint authentication has gained widespread adoption in diverse
identification systems, including smartphones, wearable devices, and attendance machines …

Information Fusion and Hand Alignment to improve Hand Recognition in Forensic Scenarios

LJ Gonzalez-Soler, DK Jónsdóttir, C Rathgeb… - IEEE …, 2024 - ieeexplore.ieee.org
In many forensic scenarios, criminals often attempt to conceal their identity by covering their
face and other distinctive body parts. In such situations, physical evidence may, however …

A Comprehensive Review of Unimodal and Multimodal Fingerprint Biometric Authentication Systems: Fusion, Attacks, and Template Protection

U Sumalatha, KK Prakasha, S Prabhu… - IEEE Access, 2024 - ieeexplore.ieee.org
In the contemporary technological landscape, biometrics, encompassing the analysis of
biological data, have gained significance. Biometrics is a methodology that utilize unique …

Fisher vectors for biometric presentation attack detection

LJ Gonzalez-Soler, M Gomez-Barrero, J Patino… - Handbook of Biometric …, 2023 - Springer
Biometric systems have experienced a large development over the last years since they are
accurate, secure and in many cases, more user convenient than traditional credential-based …

Robust Facial Biometric Authentication System Using Pupillary Light Reflex for Liveness Detection of Facial Images.

PS Prasad, AS Lakshmi, S Kautish… - … in Engineering & …, 2024 - search.ebscohost.com
Pupil dynamics are the important characteristics of face spoofing detection. The face
recognition system is one of the most used biometrics for authenticating individual identity …