Ganprintr: Improved fakes and evaluation of the state of the art in face manipulation detection
JC Neves, R Tolosana… - IEEE Journal of …, 2020 - ieeexplore.ieee.org
The availability of large-scale facial databases, together with the remarkable progresses of
deep learning technologies, in particular Generative Adversarial Networks (GANs), have led …
deep learning technologies, in particular Generative Adversarial Networks (GANs), have led …
Applications of recurrent neural network for biometric authentication & anomaly detection
Recurrent Neural Networks are powerful machine learning frameworks that allow for data to
be saved and referenced in a temporal sequence. This opens many new possibilities in …
be saved and referenced in a temporal sequence. This opens many new possibilities in …
Handwriting biometrics: Applications and future trends in e-security and e-health
Online handwritten analysis presents many applications in e-security, signature biometrics
being the most popular but not the only one. Handwriting analysis also has an important set …
being the most popular but not the only one. Handwriting analysis also has an important set …
[HTML][HTML] BehavePassDB: public database for mobile behavioral biometrics and benchmark evaluation
Mobile behavioral biometrics have become a popular topic of research, reaching promising
results in terms of authentication, exploiting a multimodal combination of touchscreen and …
results in terms of authentication, exploiting a multimodal combination of touchscreen and …
[HTML][HTML] Mobile behavioral biometrics for passive authentication
Current mobile user authentication systems based on PIN codes, fingerprint, and face
recognition have several shortcomings. Such limitations have been addressed in the …
recognition have several shortcomings. Such limitations have been addressed in the …
TypeNet: Deep learning keystroke biometrics
We study the performance of Long Short-Term Memory networks for keystroke biometric
authentication at large scale in free-text scenarios. For this we explore the performance of …
authentication at large scale in free-text scenarios. For this we explore the performance of …
A survey of privacy vulnerabilities of mobile device sensors
The number of mobile devices, such as smartphones and smartwatches, is relentlessly
increasing, to almost 6.8 billion by 2022, and along with it, the amount of personal and …
increasing, to almost 6.8 billion by 2022, and along with it, the amount of personal and …
DeepSign: Deep on-line signature verification
Deep learning has become a breathtaking technology in the last years, overcoming
traditional handcrafted approaches and even humans for many different tasks. However, in …
traditional handcrafted approaches and even humans for many different tasks. However, in …
An overview of privacy-enhancing technologies in biometric recognition
Privacy-enhancing technologies are technologies that implement fundamental data
protection principles. With respect to biometric recognition, different types of privacy …
protection principles. With respect to biometric recognition, different types of privacy …
[HTML][HTML] SVC-onGoing: Signature verification competition
This article presents SVC-onGoing 1, an on-going competition for on-line signature
verification where researchers can easily benchmark their systems against the state of the …
verification where researchers can easily benchmark their systems against the state of the …