Search Results - "2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)"

Refine Results
  1. 1

    A deep pyramid Deformable Part Model for face detection by Ranjan, Rajeev, Patel, Vishal M., Chellappa, Rama

    “…We present a face detection algorithm based on Deformable Part Models and deep pyramidal features. The proposed method called DP2MFD is able to detect faces of…”
    Get full text
    Conference Proceeding
  2. 2

    On the vulnerability of speaker verification to realistic voice spoofing by Ergunay, Serife Kucur, Khoury, Elie, Lazaridis, Alexandros, Marcel, Sebastien

    “…Automatic speaker verification (ASV) systems are subject to various kinds of malicious attacks. Replay, voice conversion and speech synthesis attacks…”
    Get full text
    Conference Proceeding
  3. 3

    LivDet 2015 fingerprint liveness detection competition 2015 by Mura, Valerio, Ghiani, Luca, Marcialis, Gian Luca, Roli, Fabio, Yambay, David A., Schuckers, Stephanie A.

    “…A spoof or fake is a counterfeit biometric that is used in an attempt to circumvent a biometric sensor. Liveness detection distinguishes between live and fake…”
    Get full text
    Conference Proceeding
  4. 4

    Smartwatch-based biometric gait recognition by Johnston, Andrew H., Weiss, Gary M.

    “…The advent of commercial smartwatches provides an intriguing new platform for mobile biometrics. Like their smartphone counterparts, these mobile devices can…”
    Get full text
    Conference Proceeding
  5. 5

    Inheritable Fisher vector feature for kinship verification by Qingfeng Liu, Puthenputhussery, Ajit, Chengjun Liu

    “…An innovative inheritable Fisher vector feature (IFVF) method is presented in this paper for kinship verification. Specifically, Fisher vector is first derived…”
    Get full text
    Conference Proceeding
  6. 6

    Attribute-based continuous user authentication on mobile devices by Samangouei, Pouya, Patel, Vishal M., Chellappa, Rama

    “…We present a method using facial attributes for continuous authentication of smartphone users. The binary attribute classifiers are trained using PubFig…”
    Get full text
    Conference Proceeding
  7. 7

    Finger vein liveness detection using motion magnification by Raghavendra, R., Avinash, Manasa, Marcel, Sebastien, Busch, Christoph

    “…Finger vein recognition has emerged as an accurate and reliable biometric modality that was deployed in various security applications. However, the use of…”
    Get full text
    Conference Proceeding
  8. 8

    Assessment of iris recognition reliability for eyes affected by ocular pathologies by Trokielewicz, Mateusz, Czajka, Adam, Maciejewicz, Piotr

    “…This paper presents an analysis of how the iris recognition is impacted by eye diseases and an appropriate dataset comprising 2996 iris images of 230 distinct…”
    Get full text
    Conference Proceeding
  9. 9

    Pose-robust face signature for multi-view face recognition by Pengfei Dou, Lingfeng Zhang, Yuhang Wu, Shah, Shishir K., Kakadiaris, Ioannis A.

    “…Despite the great progress achieved in unconstrained face recognition, pose variations still remain a challenging and unsolved practical issue. We propose a…”
    Get full text
    Conference Proceeding
  10. 10

    Acquiring high-resolution face images in outdoor environments: A master-slave calibration algorithm by Neves, Joao C., Moreno, Juan C., Barra, Silvio, Proenca, Hugo

    “…Facial recognition at-a-distance in surveillance scenarios remains an open problem, particularly due to the small number of pixels representing the facial…”
    Get full text
    Conference Proceeding
  11. 11

    Near-IR to visible light face matching: Effectiveness of pre-processing options for commercial matchers by Bernhard, John, Barr, Jeremiah, Bowyer, Kevin W., Flynn, Patrick

    “…The use of near-IR images for face recognition has been proposed as a means to address illumination issues that can hinder standard visible light face…”
    Get full text
    Conference Proceeding
  12. 12

    Mobile device application, Bluetooth, and Wi-Fi usage data as behavioral biometric traits by Neal, Tempestt J., Woodard, Damon L., Striegel, Aaron D.

    “…Patterns in the use of mobile devices have the potential to be used as a behavioral biometric for identification of the device user. We explore the…”
    Get full text
    Conference Proceeding
  13. 13

    Post-mortem iris biometric analysis in Sus scrofa domesticus by Saripalle, Sashi K., McLaughlin, Adam, Krishna, Rohit, Ross, Arun, Derakhshani, Reza

    “…Although biometric utility of ante-mortem human iris tissue has been long established, post-mortem study of human iris tissue for its biometric utility has…”
    Get full text
    Conference Proceeding
  14. 14

    A Leap Password based verification system by Chahar, Aman, Yadav, Shivangi, Nigam, Ishan, Singh, Richa, Vatsa, Mayank

    “…Recent developments in three-dimensional sensing devices has led to the proposal of a number of biometric modalities for non-critical scenarios. Leap Motion…”
    Get full text
    Conference Proceeding
  15. 15

    Keystroke dynamics recognition based on personal data: A comparative experimental evaluation implementing reproducible research by Morales, Aythami, Falanga, Mario, Fierrez, Julian, Sansone, Carlo, Ortega-Garcia, Javier

    “…This work proposes a new benchmark for keystroke dynamics recognition on the basis of fully reproducible research. Instead of traditional authentication…”
    Get full text
    Conference Proceeding
  16. 16

    Presentation attack detection using Laplacian decomposed frequency response for visible spectrum and Near-Infra-Red iris systems by Raja, Kiran B., Raghavendra, R., Busch, Christoph

    “…Biometrics systems are being challenged at the sensor level using artefact presentation such as printed artefacts or electronic screen attacks. In this work,…”
    Get full text
    Conference Proceeding
  17. 17

    On smartphone camera based fingerphoto authentication by Sankaran, Anush, Malhotra, Aakarsh, Mittal, Apoorva, Vatsa, Mayank, Singh, Richa

    “…Authenticating fingerphoto images captured using a smartphone camera, provide a good alternate solution in place of traditional pin or pattern based…”
    Get full text
    Conference Proceeding
  18. 18

    A robust sclera segmentation algorithm by Radu, Petru, Ferryman, James, Wild, Peter

    “…Sclera segmentation is shown to be of significant importance for eye and iris biometrics. However, sclera segmentation has not been extensively researched as a…”
    Get full text
    Conference Proceeding
  19. 19

    Pace independent mobile gait biometrics by Yu Zhong, Yunbin Deng, Meltzner, Geoffrey

    “…Accelerometers embedded in mobile devices have shown great potential for non-obtrusive gait biometrics by directly capturing a user's characteristic…”
    Get full text
    Conference Proceeding
  20. 20

    Treadmill attack on gait-based authentication systems by Kumar, Rajesh, Phoha, Vir V., Jain, Anshumali

    “…In this paper, we demonstrate that gait patterns of an individual captured through a smartphone accelerometer can be imitated with the support of a digital…”
    Get full text
    Conference Proceeding