Search Results - "2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS)"
-
1
A deep pyramid Deformable Part Model for face detection
Published in 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS) (01-09-2015)“…We present a face detection algorithm based on Deformable Part Models and deep pyramidal features. The proposed method called DP2MFD is able to detect faces of…”
Get full text
Conference Proceeding -
2
On the vulnerability of speaker verification to realistic voice spoofing
Published in 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS) (01-09-2015)“…Automatic speaker verification (ASV) systems are subject to various kinds of malicious attacks. Replay, voice conversion and speech synthesis attacks…”
Get full text
Conference Proceeding -
3
LivDet 2015 fingerprint liveness detection competition 2015
Published in 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS) (01-09-2015)“…A spoof or fake is a counterfeit biometric that is used in an attempt to circumvent a biometric sensor. Liveness detection distinguishes between live and fake…”
Get full text
Conference Proceeding -
4
Smartwatch-based biometric gait recognition
Published in 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS) (01-09-2015)“…The advent of commercial smartwatches provides an intriguing new platform for mobile biometrics. Like their smartphone counterparts, these mobile devices can…”
Get full text
Conference Proceeding -
5
Inheritable Fisher vector feature for kinship verification
Published in 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS) (01-09-2015)“…An innovative inheritable Fisher vector feature (IFVF) method is presented in this paper for kinship verification. Specifically, Fisher vector is first derived…”
Get full text
Conference Proceeding -
6
Attribute-based continuous user authentication on mobile devices
Published in 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS) (01-09-2015)“…We present a method using facial attributes for continuous authentication of smartphone users. The binary attribute classifiers are trained using PubFig…”
Get full text
Conference Proceeding -
7
Finger vein liveness detection using motion magnification
Published in 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS) (01-09-2015)“…Finger vein recognition has emerged as an accurate and reliable biometric modality that was deployed in various security applications. However, the use of…”
Get full text
Conference Proceeding -
8
Assessment of iris recognition reliability for eyes affected by ocular pathologies
Published in 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS) (01-09-2015)“…This paper presents an analysis of how the iris recognition is impacted by eye diseases and an appropriate dataset comprising 2996 iris images of 230 distinct…”
Get full text
Conference Proceeding -
9
Pose-robust face signature for multi-view face recognition
Published in 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS) (01-09-2015)“…Despite the great progress achieved in unconstrained face recognition, pose variations still remain a challenging and unsolved practical issue. We propose a…”
Get full text
Conference Proceeding -
10
Acquiring high-resolution face images in outdoor environments: A master-slave calibration algorithm
Published in 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS) (01-09-2015)“…Facial recognition at-a-distance in surveillance scenarios remains an open problem, particularly due to the small number of pixels representing the facial…”
Get full text
Conference Proceeding -
11
Near-IR to visible light face matching: Effectiveness of pre-processing options for commercial matchers
Published in 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS) (01-09-2015)“…The use of near-IR images for face recognition has been proposed as a means to address illumination issues that can hinder standard visible light face…”
Get full text
Conference Proceeding -
12
Mobile device application, Bluetooth, and Wi-Fi usage data as behavioral biometric traits
Published in 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS) (01-09-2015)“…Patterns in the use of mobile devices have the potential to be used as a behavioral biometric for identification of the device user. We explore the…”
Get full text
Conference Proceeding -
13
Post-mortem iris biometric analysis in Sus scrofa domesticus
Published in 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS) (01-09-2015)“…Although biometric utility of ante-mortem human iris tissue has been long established, post-mortem study of human iris tissue for its biometric utility has…”
Get full text
Conference Proceeding -
14
A Leap Password based verification system
Published in 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS) (16-12-2015)“…Recent developments in three-dimensional sensing devices has led to the proposal of a number of biometric modalities for non-critical scenarios. Leap Motion…”
Get full text
Conference Proceeding -
15
Keystroke dynamics recognition based on personal data: A comparative experimental evaluation implementing reproducible research
Published in 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS) (01-09-2015)“…This work proposes a new benchmark for keystroke dynamics recognition on the basis of fully reproducible research. Instead of traditional authentication…”
Get full text
Conference Proceeding -
16
Presentation attack detection using Laplacian decomposed frequency response for visible spectrum and Near-Infra-Red iris systems
Published in 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS) (01-09-2015)“…Biometrics systems are being challenged at the sensor level using artefact presentation such as printed artefacts or electronic screen attacks. In this work,…”
Get full text
Conference Proceeding -
17
On smartphone camera based fingerphoto authentication
Published in 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS) (01-09-2015)“…Authenticating fingerphoto images captured using a smartphone camera, provide a good alternate solution in place of traditional pin or pattern based…”
Get full text
Conference Proceeding -
18
A robust sclera segmentation algorithm
Published in 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS) (01-09-2015)“…Sclera segmentation is shown to be of significant importance for eye and iris biometrics. However, sclera segmentation has not been extensively researched as a…”
Get full text
Conference Proceeding -
19
Pace independent mobile gait biometrics
Published in 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS) (01-09-2015)“…Accelerometers embedded in mobile devices have shown great potential for non-obtrusive gait biometrics by directly capturing a user's characteristic…”
Get full text
Conference Proceeding -
20
Treadmill attack on gait-based authentication systems
Published in 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS) (01-09-2015)“…In this paper, we demonstrate that gait patterns of an individual captured through a smartphone accelerometer can be imitated with the support of a digital…”
Get full text
Conference Proceeding