Abstract is missing.
- Towards making Morphing Attack Detection robust using hybrid Scale-Space Colour Texture FeaturesRaghavendra Ramachandra, Sushma Venkatesh, Kiran B. Raja, Christoph Busch. 1-8 [doi]
- PVSNet: Palm Vein Authentication Siamese Network Trained using Triplet Loss and Adaptive Hard Mining by Learning Enforced Domain Specific FeaturesDaksh Thapar, Gaurav Jaswal, Aditya Nigam, Vivek Kanhangad. 1-8 [doi]
- Thermal to Visual Face Recognition using Transfer LearningYaswanth Gavini, B. M. Mehtre, Arun Agarwal. 1-8 [doi]
- An Efficient Online Signature Verification Based on Feature Fusion and Interval Valued Representation of Writer Specific FeaturesChandra Sekhar Vorugunti, Devanur S. Guru, Viswanath Pulabaigari. 1-9 [doi]
- Super-Resolution and Image Re-projection for Iris RecognitionEduardo Ribeiro, Andreas Uhl, Fernando Alonso-Fernandez. 1-7 [doi]
- Deep Convolutional Neural Network for Dot and Incipient Ridge Detection in High-resolution FingerprintsVijay Anand, Vivek Kanhangad. 1-6 [doi]
- Towards Reducing the Error Rates in Template Protection for Iris Recognition Using Custom Cuckoo FiltersKiran B. Raja, R. Raghavendra, Christoph Busch. 1-8 [doi]
- User Behavior Profiling using Ensemble Approach for Insider Threat DetectionMalvika Singh, B. M. Mehtre, S. Sangeetha. 1-8 [doi]
- Subband Analysis for Performance Improvement of Replay Attack Detection in Speaker Verification SystemsSachin Garg, Shruti Bhilare, Vivek Kanhangad. 1-7 [doi]
- Utilization of HOG-SVD based Features with Connected Component Labeling for Multiple Copy-move Image Forgery DetectionAnuja Dixit, Soumen Bag. 1-9 [doi]
- Utilizing Template Diversity for Fusion Of Face RecognizersSergey Tulyakov, Nishant Sankaran, Srirangaraj Setlur, Venu Govindaraju. 1-7 [doi]
- Enhanced Segmentation-CNN based Finger-Vein Recognition by Joint Training with Automatically Generated and Manual LabelsEhsaneddin Jalilian, Andreas Uhl. 1-8 [doi]
- Removing Personally Identifiable Information from Shared Dataset for Keystroke Authentication ResearchJiaju Huang, Bryan Klee, Daniel Schuckers, Daqing Hou, Stephanie Schuckers. 1-7 [doi]
- FDFNet: A Secure Cancelable Deep Finger Dorsal Template Generation Network Secured via. Bio-HashingAvantika Singh, Ashish Arora, Shreya Hasmukh Patel, Gaurav Jaswal, Aditya Nigam. 1-9 [doi]
- FDSNet: Finger dorsal image spoof detection network using light field cameraAvantika Singh, Gaurav Jaswal, Aditya Nigam. 1-9 [doi]
- Biometric based User Authentication Protocol for Mobile Cloud EnvironmentManojkumar Vivekanandan, V. N. Sastry, U. Srinivasalu Reddy. 1-6 [doi]
- Forensic Performance on Handwriting to Identify Forgery Owing to Word AlterationPriyanka Roy, Soumen Bag. 1-9 [doi]
- Spoofing PRNU Patterns of Iris Sensors while Preserving Iris RecognitionSudipta Banerjee, Vahid Mirjalili, Arun Ross. 1-10 [doi]