Abstract is missing.
- Attribute-based continuous user authentication on mobile devicesPouya Samangouei, Vishal M. Patel, Rama Chellappa. 1-8 [doi]
- Assessment of iris recognition reliability for eyes affected by ocular pathologiesMateusz Trokielewicz, Adam Czajka, Piotr Maciejewicz. 1-6 [doi]
- Music and images as contexts in a context-aware touch-based authentication systemAbena Primo, Vir V. Phoha. 1-7 [doi]
- BioEye 2015: Competition on biometrics via eye movementsOleg V. Komogortsev, Ioannis Rigas. 1-8 [doi]
- Information-theoretic performance evaluation of likelihood-ratio based biometric score fusion under modality selection attacksTakao Murakami, Kenta Takahashi. 1-8 [doi]
- Exploiting polarization-state information for cross-spectrum face recognitionNathaniel Short, Shuowen Hu, Prudhvi Gurram, Kristan Gurton. 1-6 [doi]
- Statistical evaluation of up-to-three-attempt iris recognitionAdam Czajka, Kevin W. Bowyer. 1-6 [doi]
- Joint prototype and metric learning for set-to-set matching: Application to biometricsMengjun Leng, Panagiotis Moutafis, Ioannis A. Kakadiaris. 1-8 [doi]
- Presentation attack detection using Laplacian decomposed frequency response for visible spectrum and Near-Infra-Red iris systemsKiran B. Raja, Ramachandra Raghavendra, Christoph Busch. 1-8 [doi]
- Finger vein liveness detection using motion magnificationRamachandra Raghavendra, Manasa Avinash, Sébastien Marcel, Christoph Busch. 1-7 [doi]
- Inheritable Fisher vector feature for kinship verificationQingfeng Liu, Ajit Puthenputhussery, Chengjun Liu. 1-6 [doi]
- Iris imaging in visible spectrum using white LEDKiran B. Raja, Ramachandra Raghavendra, Christoph Busch. 1-8 [doi]
- Pokerface: Partial order keeping and energy repressing method for extreme face illumination normalizationFelix Juefei-Xu, Marios Savvides. 1-8 [doi]
- Regularizing deep learning architecture for face recognition with weight variationsShruti Nagpal, Maneet Singh, Mayank Vatsa, Richa Singh. 1-6 [doi]
- Feature detection and tracking on geometric mesh data using a combined global and local shape model for face analysisShaun J. Canavan, Lijun Yin. 1-6 [doi]
- ECG biometric authentication using a dynamical modelAbhijit Sarkar, A. Lynn Abbott, Zachary R. Doerzaph. 1-6 [doi]
- Learning-based ballistic breech face impression image matchingJoseph Roth, Andrew Carriveau, Xiaoming Liu, Anil K. Jain. 1-8 [doi]
- Keystroke dynamics recognition based on personal data: A comparative experimental evaluation implementing reproducible researchAythami Morales, Mario Falanga, Julian Fiérrez, Carlo Sansone, Javier Ortega-Garcia. 1-6 [doi]
- Towards repeatable, reproducible, and efficient biometric technology evaluationsGregory Fiumara, Wayne Salamon, Craig Watson. 1-8 [doi]
- On the vulnerability of speaker verification to realistic voice spoofingSerife Kucur Ergunay, Elie el Khoury, Alexandros Lazaridis, Sébastien Marcel. 1-6 [doi]
- Improvements to keystroke-based authentication by adding linguistic contextAdam Goodkind, David-Guy Brizan, Andrew Rosenberg. 1-6 [doi]
- Unconstrained face verification using fisher vectors computed from frontalized facesJun-Cheng Chen, Swami Sankaranarayanan, Vishal M. Patel, Rama Chellappa. 1-8 [doi]
- Smartwatch-based biometric gait recognitionAndrew H. Johnston, Gary M. Weiss. 1-6 [doi]
- Treadmill attack on gait-based authentication systemsRajesh Kumar, Vir V. Phoha, Anshumali Jain. 1-7 [doi]
- Pace independent mobile gait biometricsYu Zhong 0001, Yunbin Deng, Geoffrey S. Meltzner. 1-8 [doi]
- Post-mortem iris biometric analysis in Sus scrofa domesticusSashi K. Saripalle, Adam McLaughlin, Rohit Krishna, Arun Ross, Reza Derakhshani. 1-5 [doi]
- Exploiting stable and discriminative iris weight map for iris recognition under less constrained environmentYang Hu, Konstantinos Sirlantzis, Gareth Howells. 1-8 [doi]
- Robust face recognition based on saliency maps of sigma setsRamya Srinivasan, Amit K. Roy Chowdhury. 1-6 [doi]
- Bin-based weak classifier fusion of iris and face biometricsDi Miao, Man Zhang, Haiqing Li, Zhenan Sun, Tieniu Tan. 1-6 [doi]
- Mobile device application, Bluetooth, and Wi-Fi usage data as behavioral biometric traitsTempestt J. Neal, Damon L. Woodard, Aaron D. Striegel. 1-6 [doi]
- A Leap Password based verification systemAman Chahar, Shivangi Yadav, Ishan Nigam, Richa Singh, Mayank Vatsa. 1-6 [doi]
- Human and algorithm performance on the PaSC face Recognition ChallengeP. Jonathon Phillips, Matthew Q. Hill, Jake A. Swindle, Alice J. O'Toole. 1-8 [doi]
- LivDet 2015 fingerprint liveness detection competition 2015Valerio Mura, Luca Ghiani, Gian Luca Marcialis, Fabio Roli, David A. Yambay, Stephanie A. C. Schuckers. 1-6 [doi]
- Acquiring high-resolution face images in outdoor environments: A master-slave calibration algorithmJoão C. Neves, Juan Carlos Moreno, Silvio Barra, Hugo Proença. 1-8 [doi]
- A deep neural network for audio-visual person recognitionMohammad Rafiqul Alam, Mohammed Bennamoun, Roberto Togneri, Ferdous Ahmed Sohel. 1-6 [doi]
- e-BioSign tool: Towards scientific assessment of dynamic signatures under forensic conditionsRubén Vera-Rodríguez, Julian Fiérrez, Javier Ortega-Garcia, A. Acien, Rubén Tolosana. 1-6 [doi]
- Spoofing key-press latencies with a generative keystroke dynamics modelJohn V. Monaco, Md Liakat Ali, Charles C. Tappert. 1-8 [doi]
- Limbus impact removal for off-angle iris recognition using eye modelsOsman M. Kurtuncu, Mahmut Karakaya. 1-6 [doi]
- Pose-robust face signature for multi-view face recognitionPengfei Dou, LingFeng Zhang, Yuhang Wu, Shishir K. Shah, Ioannis A. Kakadiaris. 1-8 [doi]
- fNIRS: A new modality for brain activity-based biometric authenticationAbdul Serwadda, Vir V. Phoha, Sujit Poudel, Leanne M. Hirshfield, Danushka Bandara, Sarah E. Bratt, Mark R. Costa. 1-7 [doi]
- Fusing binary templates for multi-biometric cryptosystemsGuangcan Mai, Meng-Hui Lim, Pong C. Yuen. 1-8 [doi]
- SSBC 2015: Sclera segmentation benchmarking competitionAbhijit Das, Umapada Pal, Miguel A. Ferrer, Michael Blumenstein. 1-6 [doi]
- Near-IR to visible light face matching: Effectiveness of pre-processing options for commercial matchersJohn Bernhard, Jeremiah R. Barr, Kevin W. Bowyer, Patrick J. Flynn. 1-8 [doi]
- Person verification via eye movement-driven text reading modelEvgeniy R. Abdulin, Oleg V. Komogortsev. 1-8 [doi]
- On humanoid robots imitating human touch gestures on the smart phoneSujit Poudel, Abdul Serwadda, Vir V. Phoha. 1-7 [doi]
- Towards fitting a 3D dense facial model to a 2D image: A landmark-free approachYuhang Wu, Xiang Xu, Shishir K. Shah, Ioannis A. Kakadiaris. 1-8 [doi]
- Latent fingerprint from multiple surfaces: Database and quality analysisAnush Sankaran, Akshay Agarwal, Rohit Keshari, Soumyadeep Ghosh, Anjali Sharma, Mayank Vatsa, Richa Singh. 1-6 [doi]
- Still to video face recognition using a heterogeneous matching approachYu Zhu, Zhenzhu Zheng, Yan Li, Guowang Mu, Shiguang Shan, Guodong Guo. 1-6 [doi]
- On smartphone camera based fingerphoto authenticationAnush Sankaran, Aakarsh Malhotra, Apoorva Mittal, Mayank Vatsa, Richa Singh. 1-7 [doi]
- Robust biometrics recognition using joint weighted dictionary learning and smoothed L0 normRahman Khorsandi, Ali Taalimi, Mohamed Abdel-Mottaleb. 1-6 [doi]
- Modest proposals for improving biometric recognition papersJames R. Matey, George W. Quinn, Patrick Grother, Elham Tabassi, Craig Watson, James L. Wayman. 1-7 [doi]
- Periocular biometrics in mobile environmentTiago de Freitas Pereira, Sébastien Marcel. 1-7 [doi]
- Feature and keypoint selection for visible to near-infrared face matchingSoumyadeep Ghosh, Tejas I. Dhamecha, Rohit Keshari, Richa Singh, Mayank Vatsa. 1-7 [doi]
- A robust sclera segmentation algorithmPetru Radu, James M. Ferryman, Peter Wild. 1-6 [doi]
- Irreversible fingerprint template using Minutiae Relation Code with Bloom FilterNarishige Abe, Shigefumi Yamada, Takashi Shinzaki. 1-7 [doi]
- Combining 3D and 2D for less constrained periocular recognitionLulu Chen, James M. Ferryman. 1-6 [doi]
- A deep pyramid Deformable Part Model for face detectionRajeev Ranjan, Vishal M. Patel, Rama Chellappa. 1-8 [doi]
- BMDT: An optimized method for Biometric Menagerie DetectionHe Zheng, Liao Ni, Ran Xian, Shilei Liu, Wenxin Li. 1-8 [doi]