Biometric recognition in automated border control: a survey

RD Labati, A Genovese, E Muñoz, V Piuri… - ACM Computing …, 2016 - dl.acm.org
The increasing demand for traveler clearance at international border crossing points (BCPs)
has motivated research for finding more efficient solutions. Automated border control (ABC) …

Biometrics: Trust, but verify

AK Jain, D Deb, JJ Engelsma - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Over the past two decades, biometric recognition has exploded into a plethora of different
applications around the globe. This proliferation can be attributed to the high levels of …

Learning a fixed-length fingerprint representation

JJ Engelsma, K Cao, AK Jain - IEEE transactions on pattern …, 2019 - ieeexplore.ieee.org
We present DeepPrint, a deep network, which learns to extract fixed-length fingerprint
representations of only 200 bytes. DeepPrint incorporates fingerprint domain knowledge …

Face demorphing

M Ferrara, A Franco, D Maltoni - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The morphing attack proved to be a serious threat for modern automated border control
systems where face recognition is used to link the identity of a passenger to his/her e …

C2CL: Contact to contactless fingerprint matching

SA Grosz, JJ Engelsma, E Liu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Matching contactless fingerprints or finger photos to contact-based fingerprint impressions
has received increased attention in the wake of COVID-19 due to the superior hygiene of the …

Printsgan: Synthetic fingerprint generator

JJ Engelsma, S Grosz, AK Jain - IEEE Transactions on Pattern …, 2022 - ieeexplore.ieee.org
A major impediment to researchers working in the area of fingerprint recognition is the lack
of publicly available, large-scale, fingerprint datasets. The publicly available datasets that do …

Morphing attack detection-database, evaluation platform, and benchmarking

K Raja, M Ferrara, A Franco… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite
the number of advancements reported in recent works, we note serious open issues such as …

On the effects of image alterations on face recognition accuracy

M Ferrara, A Franco, D Maltoni - Face recognition across the imaging …, 2016 - Springer
Face recognition in controlled environments is nowadays considered rather reliable, and if
face is acquired in proper conditions, a good accuracy level can be achieved by state-of-the …

Afr-net: Attention-driven fingerprint recognition network

SA Grosz, AK Jain - IEEE Transactions on Biometrics, Behavior …, 2023 - ieeexplore.ieee.org
The use of vision transformers (ViT) in computer vision is increasing due to its limited
inductive biases (eg, locality, weight sharing, etc.) and increased scalability compared to …

Spoofgan: Synthetic fingerprint spoof images

SA Grosz, AK Jain - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
A major limitation to advances in fingerprint presentation attack detection (PAD) is the lack of
publicly available, large-scale datasets, a problem which has been compounded by …