Abstract is missing.
- Improving the Dense Trajectories Approach Towards Efficient Recognition of Simple Human ActivitiesFernando Camarena, Leonardo Chang, Miguel González-Mendoza. 1-6 [doi]
- Blind Source Camera Clustering of Criminal Case DataLuca Debiasi, Elisabet Leitet, Kristin Norell, Theodoros Tachos, Andreas Uhl. 1-6 [doi]
- PRNU-based Detection of Finger Vein Presentation AttacksBabak Maser, Dominik Söllinger, Andreas Uhl. 1-6 [doi]
- Arabic Writer Verification Based on Shape ComplexityBensefia. 1-6 [doi]
- A Biologically-inspired Attentional Approach for Face RecognitionSouad Khellat-Kihel, Massimo Tistarelli. 1-5 [doi]
- Accelerometer Dense Trajectories for Activity Recognition and People IdentificationRoberto Leyva, Geise Santos, Anderson Rocha, Victor Sanchez, Chang-Tsun Li. 1-6 [doi]
- Scene-based Imperceptible-visible Watermarking for HDR Video ContentKarina Perez-Daniel, Francisco J. García-Ugalde, Victor Sanchez. 1-6 [doi]
- An Efficient Botnet Detection Methodology using Hyper-parameter Optimization Trough Grid-Search TechniquesDavid Gonzalez-Cuautle, Uriel Yair Corral-Salinas, Gabriel Sanchez-Perez, Héctor Pérez-Meana, Karina Toscano-Medina, Aldo Hernandez-Suarez. 1-6 [doi]
- Watermarking-based Self-Recovery and Authentication Framework for Colour ImagesJ. Molina, Volodymyr I. Ponomaryov, Rogelio Reyes-Reyes, Clara Cruz-Ramos. 1-6 [doi]
- A Robust Image Zero-watermarking using Convolutional Neural NetworksAtoany N. Fierro-Radilla, Mariko Nakano-Miyatake, Manuel Cedillo-Hernandez, Laura Cleofas-Sánchez, Héctor Pérez-Meana. 1-5 [doi]
- Custom silicone Face Masks: Vulnerability of Commercial Face Recognition Systems & Presentation Attack DetectionRaghavendra Ramachandra, Sushma Venkatesh, Kiran B. Raja, Sushil Bhattacharjee, Pankaj Wasnik, Sébastien Marcel, Christoph Busch. 1-6 [doi]
- Influence of segmentation on deep iris recognition performanceJus Lozej, Dejan Stepec, Vitomir Struc, Peter Peer. 1-6 [doi]
- Visible Watermarking Robust against Inpainting Using Seam CarvingKevin Rangel-Espinoza, Eduardo Fragoso-Navarro, Clara Cruz-Ramos, Mariko Nakano-Miyatake, Manuel Cedillo-Hernandez, Héctor Pérez-Meana. 1-6 [doi]
- A Graphical User Interface for Fast Evaluation and Testing of Machine Learning Models PerformanceLeonel Rosas-Arias, Gabriel Sanchez-Perez, Linda K. Toscano-Medina, Héctor M. Pérez Meana, José Portillo-Portillo. 1-5 [doi]
- Comparative Test of Smartphone Finger Photo vs. Touch-based Cross-sensor Fingerprint RecognitionPeter Wild, Franz Daubner, Harald Penz, Gustavo Fernández Domínguez. 1-6 [doi]
- Feature Extraction based on High Order Statistics measures and Entropy for EEG biometricsSukun Li, Sung-Hyuk Cha. 1-6 [doi]
- Local Deep Features for Composite Face Sketch RecognitionHeydi Méndez-Vázquez, Fabiola Becerra-Riera, Annette Morales-González, Leyanis López-Avila, Massimo Tistarelli. 1-6 [doi]
- Social Network Forensics through Smartphones and Shared ImagesRahimeh Rouhi, Flavio Bertini, Danilo Montesi, Chang-Tsun Li. 1-6 [doi]
- Euclidean-Distance Based Fuzzy Commitment Scheme for Biometric Template SecurityBabak Poorebrahim Gilkalaye, Ajita Rattani, Reza Derakhshani. 1-6 [doi]
- Ownership Identification of Digital Video via Unseen-Visible WatermarkingPablo de Jesus Vega-Hernandez, Manuel Cedillo-Hernandez, Mariko Nakano, Antonio Cedillo-Hernandez, Héctor Manuel Pérez Meana. 1-6 [doi]
- Copy-Move Forgery Detection Algorithm using Frequency Transforms, SURF and MSERKelsey A. Ramírez-Gutiérrez, Mariko Nakano, Gabriel Sanchez-Perez, Héctor Pérez-Meana. 1-6 [doi]
- Analysis of hand-crafted and learned feature extraction methods for real-time facial expression recognitionJesus Olivares-Mercado, Karina Toscano-Medina, Gabriel Sanchez-Perez, José Portillo-Portillo, Héctor Pérez-Meana, Gibran Benitez-Garcia. 1-6 [doi]
- A Cancellable Face Template Scheme Based on Nonlinear Multi-Dimension Spectral HashingXing-Bo Dong, KokSheik Wong, Zhe Jin, Jean-Luc Dugelay. 1-6 [doi]
- Mathematical models for the discordant size content replacement attackJuan Jose Gomez-Ricardez, Ramón Parra-Michel, Jose Juan Garcia Hernandez. 1-5 [doi]
- Automatic Malware Clustering using Word Embeddings and Unsupervised LearningHugo Leonardo Duarte-Garcia, Alberto Cortez-Marquez, Gabriel Sanchez-Perez, Héctor Pérez-Meana, Karina Toscano-Medina, Aldo Hernandez-Suarez. 1-6 [doi]
- Combating the Elsagate Phenomenon: Deep Learning Architectures for Disturbing CartoonsAkari Ishikawa, Edson Bollis, Sandra Avila. 1-6 [doi]
- Speaker verification with fake intonation based on Neural NetworksAngie Natalia Vasquez, Dora María Ballesteros L., Diego Renza. 1-5 [doi]