Abstract is missing.
- An offline user-verifiable electronic traveler's check systemChin-Chen Chang, Jen-Ho Yang, Yu-Wei Lai, Yanjun Liu. 1-6 [doi]
- Is your biometric system robust to morphing attaeks?Marta Gomez-Barrero, Christian Rathgeb, Ulrich Scherhag, Christoph Busch. 1-6 [doi]
- Random sampling for patch-based face recognitionIsmahane Cheheb, Noor Al-Máadeed, Somaya Al-Máadeed, Ahmed Bouridane, Richard M. Jiang. 1-5 [doi]
- An adaptive tri-pixel unit steganographic algorithm using the least two significant bitsXiangyu Yu, Hui Liang, Minting Li, Chang-Tsun Li. 1-6 [doi]
- Reversible data hiding in JPEG images based on adjustable paddingChing-Chun Chang, Chang-Tsun Li. 1-6 [doi]
- An automatic visible watermark detection method using total variationHector Santoyo-Garcia, Eduardo Fragoso-Navarro, Rogelio Reyes-Reyes, Gabriel Sanchez-Perez, Mariko Nakano-Miyatake, Héctor Pérez-Meana. 1-5 [doi]
- Compact image steganalysis for LSB-matching steganographyOswaldo Juarez-Sandoval, Manuel Cedillo-Hernandez, Gabriel Sanchez-Perez, Karina Toscano-Medina, Héctor Pérez-Meana, Mariko Nakano-Miyatake. 1-6 [doi]
- The LV dataset: A realistic surveillance video dataset for abnormal event detectionRoberto Leyva, Victor Sanchez, Chang-Tsun Li. 1-6 [doi]
- Benchmarking face morphing forgery detection: Application of stirtrace for impact simulation of different processing stepsMario Hildebrandt, Tom Neubert, Andrey Makrushin, Jana Dittmann. 1-6 [doi]
- Improved unseen-visible watermarking for copyrigth protection of digital imageOswaldo Juarez-Sandoval, Eduardo Fragoso-Navarro, Manuel Cedillo-Hernandez, Mariko Nakano, Héctor Pérez-Meana, Antonio Cedillo-Hernandez. 1-5 [doi]
- Sparse error gait image: A new representation for gait recognitionTanmay Tulsidas Verlekar, Paulo Lobato Correia, Luís Ducla Soares. 1-6 [doi]
- Fast and robust framework for view-invariant gait recognitionNing Jia, Chang-Tsun Li, Victor Sanchez, Alan Wee-Chung Liew. 1-6 [doi]
- Non-reference image quality assessment for biometric presentation attack detectionAmrit Pal Singh Bhogal, Dominik Söllinger, Pauline Trung, Andreas Uhl. 1-6 [doi]
- Self Geometric Relationship-based matching for palmprint identification using SIFTJumma Alamghtuf, Fouad Khelifi. 1-5 [doi]
- Sensor dependency in efficient fingerprint image protection using selective JPEG2000 encryptionMartin Draschl, Jutta Hämmerle-Uhl, Andreas Uhl. 1-6 [doi]
- Full-fingerprint volumetric subsurface imaging using Fourier-domain Optical Coherence TomographyCtirad Sousedik, Ralph Breithaupt. 1-6 [doi]
- Face recognition system for smartphone based on LBPJesus Olivares-Mercado, Karina Toscano-Medina, Gabriel Sanchez-Perez, Héctor Pérez-Meana, Mariko Nakano-Miyatake. 1-6 [doi]
- Template ageing in non-minutiae fingerprint recognitionSimon Kirchgasser, Andreas Uhl. 1-6 [doi]
- Predicting political mood tendencies based on Twitter dataA. Hernandez-Suarez, Gabriel Sanchez-Perez, V. Martinez-Hernandez, Héctor M. Pérez Meana, Karina Toscano-Medina, Mariko Nakano, Victor Sanchez. 1-6 [doi]
- Speaker identification evaluation based on the speech biometric and i-vector model using the TIMIT and NTIMIT databasesMusab T. S. Al-Kaltakchi, Wai Lok Woo, Satnam Singh Dlay, Jonathon A. Chambers. 1-6 [doi]
- The IST-EURECOM Light Field Face DatabaseAlireza Sepas-Moghaddam, Valeria Chiesa, Paulo Lobato Correia, Fernando Pereira 0001, Jean-Luc Dugelay. 1-6 [doi]
- Efficient finger segmentation robust to hand alignment in imaging with application to human verificationRaid Rafi Omar Al-Nima, Satnam Singh Dlay, W. L. Woo, Jonathon A. Chambers. 1-6 [doi]
- Combining multiple iris texture features for unconstrained recognition in visible wavelengthsEsbern Andersen-Hoppe, Christian Rathgeb, Christoph Busch. 1-6 [doi]
- A reversible data hiding scheme for image interpolation based on reference matrixChin-Chen Chang, Thai Son Nguyen, Yanjun Liu. 1-6 [doi]
- Face anti-spoofing countermeasure: Efficient 2D materials classification using polarization imagingAzim Zaliha Abd Aziz, Hong Wei, James M. Ferryman. 1-6 [doi]
- Manually annotated characteristic descriptors: Measurability and variabilityChris Zeinstra, Raymond N. J. Veldhuis, Luuk J. Spreeuwers, Arnout C. Ruifrok. 1-6 [doi]
- On the vulnerability of face recognition systems towards morphed face attacksUlrich Scherhag, R. Raghavendra, K. B. Raja, Marta Gomez-Barrero, Christian Rathgeb, Christoph Busch. 1-6 [doi]
- Integrating facial makeup detection into multimodal biometric user verification systemEkberjan Derman, Chiara Galdi, Jean-Luc Dugelay. 1-6 [doi]
- Feature level fused templates for multi-biometric system on smartphonesMartin Stokkenes, Ramachandra Raghavendra, Kiran B. Raja, Morten K. Sigaard, Christoph Busch. 1-5 [doi]
- Reversible data hiding in encrypted images using reformed JPEG compressionXiaozhu Xie, Chin-Chen Chang. 1-5 [doi]
- Assessing face image quality for smartphone based face recognition systemPankaj Shivdayal Wasnik, Kiran B. Raja, Ramachandra Raghavendra, Christoph Busch. 1-6 [doi]
- From image to sensor: Comparative evaluation of multiple PRNU estimation schemes for identifying sensors from NIR iris imagesSudipta Banerjee, Arun Ross. 1-6 [doi]
- Transferable deep convolutional neural network features for fingervein presentation attack detectionRaghavendra Raghavendra, Sushma Venkatesh, Kiran B. Raja, Christoph Busch. 1-5 [doi]