Abstract is missing.
- Joint operation of voice biometrics and presentation attack detectionPavel Korshunov, Sébastien Marcel. 1-6 [doi]
- On categorising gender in surveillance imageryDaniel Martinho-Corbishley, Mark S. Nixon, John N. Carter. 1-6 [doi]
- Subspace learning via low rank projections for dimensionality reductionDevansh Arpit, Chetan Ramaiah, Venu Govindaraju. 1-7 [doi]
- An empirical evaluation of activities and classifiers for user identification on smartphonesChunxu Tang, Vir V. Phoha. 1-8 [doi]
- Long range standoff speaker identification using laser Doppler vibrometerYunbin Deng. 1-6 [doi]
- KBOC: Keystroke biometrics OnGoing competitionAythami Morales, Julian Fiérrez, Marta Gomez-Barrero, Javier Ortega-Garcia, Roberto Daza, John V. Monaco, Jugurta Montalvao, Janio Canuto, Anjith George. 1-6 [doi]
- On the reproducibility and repeatability of likelihood ratio in forensics: A case study using face biometricsNik Suki, Norman Poh, Firham M. Senan, Nazri A. Zamani, M. Zaharudin A. Darus. 1-8 [doi]
- Convolutional neural networks for attribute-based active authentication on mobile devicesPouya Samangouei, Rama Chellappa. 1-8 [doi]
- Long-term people reidentification using anthropometric signatureMohamed Hasan, Noboru Babaguchi. 1-6 [doi]
- Impact of environmental factors on biometric matching during human decompositionDavid S. Bolme, Ryan A. Tokola, Chris Boehnen, Tiffany B. Saul, Kelly A. Sauerwein, Dawnie Wolfe. 1-8 [doi]
- Pitfalls in studying "big data" from operational scenariosEstefan Ortiz, Kevin W. Bowyer. 1-7 [doi]
- Multiscale representation for partial face recognition under near infrared illuminationLingxiao He, Haiqing Li, Qi Zhang, Zhenan Sun, Zhaofeng He. 1-7 [doi]
- On matching cross-spectral periocular images for accurate biometrics identificationN. Pattabhi Ramaiah, Ajay Kumar. 1-6 [doi]
- Multi-patch convolution neural network for iris liveness detectionLingxiao He, Haiqing Li, Fei Liu, Nianfeng Liu, Zhenan Sun, Zhaofeng He. 1-7 [doi]
- PRNU-based image alignment for defective pixel detectionChristof Kauba, Andreas Uhl. 1-7 [doi]
- Facial dynamic modelling using long short-term memory network: Analysis and application to face authenticationSeong-Tae Kim, Dae Hoe Kim, Yong Man Ro. 1-6 [doi]
- Keystroke biometric studies with short numeric input on smartphonesMichael J. Coakley, John V. Monaco, Charles C. Tappert. 1-6 [doi]
- Fastfood dictionary learning for periocular-based full face hallucinationFelix Juefei-Xu, Marios Savvides. 1-8 [doi]
- On the robustness of audiovisual liveness detection to visual speech animationJukka Komulainen, Iryna Anina, Jukka Holappa, Elhocine Boutellaa, Abdenour Hadid. 1-8 [doi]
- User authentication with keystroke dynamics in long-text dataHayreddin Çeker, Shambhu J. Upadhyaya. 1-6 [doi]
- Automated classification of mislabeled near-infrared left and right iris images using convolutional neural networksYixin Du, Thirimachos Bourlai, Jeremy Dawson. 1-6 [doi]
- Using a CNN ensemble for detecting pornographic and upskirt imagesYi Huang, Adams Wai-Kin Kong. 1-7 [doi]
- Triplet probabilistic embedding for face verification and clusteringSwami Sankaranarayanan, Azadeh Alavi, Carlos D. Castillo, Rama Chellappa. 1-8 [doi]
- Active user authentication for smartphones: A challenge data set and benchmark resultsUpal Mahbub, Sayantan Sarkar, Vishal M. Patel, Rama Chellappa. 1-8 [doi]
- Fixed FAR correction factor of score level fusionN. Susyanto, Raymond N. J. Veldhuis, Luuk J. Spreeuwers, C. A. J. Klaassen. 1-8 [doi]
- Very low-resolution iris recognition via Eigen-patch super-resolution and matcher fusionFernando Alonso-Fernandez, Reuben A. Farrugia, Josef Bigün. 1-8 [doi]
- Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patternsRajesh Kumar, Vir V. Phoha, Abdul Serwadda. 1-8 [doi]
- Estimation of visible spectrum faces from polarimetric thermal facesBenjamin S. Riggan, Nathaniel J. Short, Shuowen Hu, Heesung Kwon. 1-7 [doi]
- Face anti-spoofing using Haralick featuresAkshay Agarwal, Richa Singh, Mayank Vatsa. 1-6 [doi]
- A study on iris textural correlation using steering kernelsYang Hu, Konstantinos Sirlantzis, Gareth Howells. 1-8 [doi]
- A cascaded convolutional neural network for age estimation of unconstrained facesJun-Cheng Chen, Amit Kumar, Rajeev Ranjan, Vishal M. Patel, Azadeh Alavi, Rama Chellappa. 1-8 [doi]
- A multibiometrics-based CAPTCHA for improved online securityBrian M. Powell, Abhishek Kumar, Jatin Thapar, Gaurav Goswami, Mayank Vatsa, Richa Singh, Afzel Noore. 1-8 [doi]
- A multimedia application for location-based semantic retrieval of tattoosMichael Martin, Xuan Xu, Thirimachos Bourlai. 1-8 [doi]
- Toward facial re-identification: Experiments with data from an operational surveillance camera plantPei Li, Joel Brogan, Patrick J. Flynn. 1-8 [doi]
- Which finger is the best for finger vein recognition?He Zheng, Yapeng Ye, Liao Ni, Shilei Liu, Wenxin Li. 1-5 [doi]
- Biometric identification of identical twins: A surveyKevin W. Bowyer, Patrick J. Flynn. 1-8 [doi]
- Cross-spectral cross-resolution video database for face recognitionManeet Singh, Shruti Nagpal, Nikita Gupta, Sanchit Gupta, Soumyadeep Ghosh, Richa Singh, Mayank Vatsa. 1-7 [doi]
- RGB-D face recognition via learning-based reconstructionAnurag Chowdhury, Soumyadeep Ghosh, Richa Singh, Mayank Vatsa. 1-7 [doi]
- Towards a deep learning framework for unconstrained face detectionYutong Zheng, Chenchen Zhu, Khoa Luu, Chandrasekhar Bhagavatula, T. Hoang Ngan Le, Marios Savvides. 1-8 [doi]
- Biometric authentication using photoplethysmography signalsAbhijit Sarkar, A. Lynn Abbott, Zachary R. Doerzaph. 1-7 [doi]
- Your substance abuse disorder is an open secret! Gleaning sensitive personal information from templates in an EEG-based authentication systemRichard Matovu, Abdul Serwadda. 1-7 [doi]
- Investigating the impact of drug induced pupil dilation on automated iris recognitionInmaculada Tomeo-Reyes, Arun Ross, Vinod Chandran. 1-8 [doi]
- Unconstrained human identification using comparative facial soft biometricsNawaf Almudhahka, Mark S. Nixon, Jonathon S. Hare. 1-6 [doi]
- Quickest intrusion detection in mobile active user authenticationPramuditha Perera, Vishal M. Patel. 1-8 [doi]
- Detecting morphed face imagesRamachandra Raghavendra, Kiran B. Raja, Christoph Busch. 1-7 [doi]
- Report on the BTAS 2016 Video Person Recognition EvaluationWalter J. Scheirer, Patrick J. Flynn, Changxing Ding, Guodong Guo, Vitomir Struc, Mohamad Al Jazaery, Klemen Grm, Simon Dobrisek, Dacheng Tao, Yu Zhu, Joel Brogan, Sandipan Banerjee, Aparna Bharati, Brandon RichardWebster. 1-8 [doi]
- Detecting medley of iris spoofing attacks using DESISTNaman Kohli, Daksha Yadav, Mayank Vatsa, Richa Singh, Afzel Noore. 1-6 [doi]
- Template aging in 3D and 2D face recognitionIshan Manjani, Hakki Sumerkan, Patrick J. Flynn, Kevin W. Bowyer. 1-6 [doi]
- Fingerphoto spoofing in mobile devices: A preliminary studyArchit Taneja, Aakriti Tayal, Aakarsh Malhotra, Anush Sankaran, Mayank Vatsa, Richa Singh. 1-7 [doi]
- Adaptive techniques for intra-user variability in keystroke dynamicsHayreddin Çeker, Shambhu J. Upadhyaya. 1-6 [doi]
- Crossing domains with the inductive transfer encoder: Case study in keystroke biometricsJohn V. Monaco, Manuel M. Vindiola. 1-8 [doi]
- The BTAS∗Competition on Mobile Iris RecognitionMan Zhang, Qi Zhang, Zhenan Sun, Shujuan Zhou, Nasir Uddin Ahmed. 1-7 [doi]
- Depth-based action recognition using multiscale sub-actions depth motion maps and local auto-correlation of space-time gradientsChengwu Liang, Lin Qi, Enqing Chen, Ling Guan. 1-7 [doi]
- Overview of BTAS 2016 speaker anti-spoofing competitionPavel Korshunov, Sébastien Marcel, Hannah Muckenhirn, A. R. Goncalves, A. G. Souza Mello, R. P. Velloso Violato, Flávio O. Simões, M. U. Neto, Marcus de Assis Angeloni, José Augusto Stuchi, H. Dinkel, N. Chen, Y. Qian, Dipjyoti Paul, Goutam Saha, Md. Sahidullah. 1-6 [doi]
- On accuracy estimation and comparison of results in biometric researchDomingo Mery, Yuning Zhao, Kevin W. Bowyer. 1-8 [doi]
- Human iris recognition in post-mortem subjects: Study and databaseMateusz Trokielewicz, Adam Czajka, Piotr Maciejewicz. 1-6 [doi]