Biometric recognition in automated border control: a survey
The increasing demand for traveler clearance at international border crossing points (BCPs)
has motivated research for finding more efficient solutions. Automated border control (ABC) …
has motivated research for finding more efficient solutions. Automated border control (ABC) …
Biometrics: Trust, but verify
Over the past two decades, biometric recognition has exploded into a plethora of different
applications around the globe. This proliferation can be attributed to the high levels of …
applications around the globe. This proliferation can be attributed to the high levels of …
Learning a fixed-length fingerprint representation
We present DeepPrint, a deep network, which learns to extract fixed-length fingerprint
representations of only 200 bytes. DeepPrint incorporates fingerprint domain knowledge …
representations of only 200 bytes. DeepPrint incorporates fingerprint domain knowledge …
Face demorphing
The morphing attack proved to be a serious threat for modern automated border control
systems where face recognition is used to link the identity of a passenger to his/her e …
systems where face recognition is used to link the identity of a passenger to his/her e …
C2CL: Contact to contactless fingerprint matching
Matching contactless fingerprints or finger photos to contact-based fingerprint impressions
has received increased attention in the wake of COVID-19 due to the superior hygiene of the …
has received increased attention in the wake of COVID-19 due to the superior hygiene of the …
Printsgan: Synthetic fingerprint generator
A major impediment to researchers working in the area of fingerprint recognition is the lack
of publicly available, large-scale, fingerprint datasets. The publicly available datasets that do …
of publicly available, large-scale, fingerprint datasets. The publicly available datasets that do …
Morphing attack detection-database, evaluation platform, and benchmarking
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite
the number of advancements reported in recent works, we note serious open issues such as …
the number of advancements reported in recent works, we note serious open issues such as …
On the effects of image alterations on face recognition accuracy
Face recognition in controlled environments is nowadays considered rather reliable, and if
face is acquired in proper conditions, a good accuracy level can be achieved by state-of-the …
face is acquired in proper conditions, a good accuracy level can be achieved by state-of-the …
Afr-net: Attention-driven fingerprint recognition network
The use of vision transformers (ViT) in computer vision is increasing due to its limited
inductive biases (eg, locality, weight sharing, etc.) and increased scalability compared to …
inductive biases (eg, locality, weight sharing, etc.) and increased scalability compared to …
Spoofgan: Synthetic fingerprint spoof images
A major limitation to advances in fingerprint presentation attack detection (PAD) is the lack of
publicly available, large-scale datasets, a problem which has been compounded by …
publicly available, large-scale datasets, a problem which has been compounded by …