Ganprintr: Improved fakes and evaluation of the state of the art in face manipulation detection

JC Neves, R Tolosana… - IEEE Journal of …, 2020 - ieeexplore.ieee.org
The availability of large-scale facial databases, together with the remarkable progresses of
deep learning technologies, in particular Generative Adversarial Networks (GANs), have led …

Applications of recurrent neural network for biometric authentication & anomaly detection

JM Ackerson, R Dave, N Seliya - Information, 2021 - mdpi.com
Recurrent Neural Networks are powerful machine learning frameworks that allow for data to
be saved and referenced in a temporal sequence. This opens many new possibilities in …

Handwriting biometrics: Applications and future trends in e-security and e-health

M Faundez-Zanuy, J Fierrez, MA Ferrer, M Diaz… - Cognitive …, 2020 - Springer
Online handwritten analysis presents many applications in e-security, signature biometrics
being the most popular but not the only one. Handwriting analysis also has an important set …

[HTML][HTML] BehavePassDB: public database for mobile behavioral biometrics and benchmark evaluation

G Stragapede, R Vera-Rodriguez, R Tolosana… - Pattern Recognition, 2023 - Elsevier
Mobile behavioral biometrics have become a popular topic of research, reaching promising
results in terms of authentication, exploiting a multimodal combination of touchscreen and …

[HTML][HTML] Mobile behavioral biometrics for passive authentication

G Stragapede, R Vera-Rodriguez, R Tolosana… - Pattern Recognition …, 2022 - Elsevier
Current mobile user authentication systems based on PIN codes, fingerprint, and face
recognition have several shortcomings. Such limitations have been addressed in the …

TypeNet: Deep learning keystroke biometrics

A Acien, A Morales, JV Monaco… - … and Identity Science, 2021 - ieeexplore.ieee.org
We study the performance of Long Short-Term Memory networks for keystroke biometric
authentication at large scale in free-text scenarios. For this we explore the performance of …

A survey of privacy vulnerabilities of mobile device sensors

P Delgado-Santos, G Stragapede, R Tolosana… - ACM Computing …, 2022 - dl.acm.org
The number of mobile devices, such as smartphones and smartwatches, is relentlessly
increasing, to almost 6.8 billion by 2022, and along with it, the amount of personal and …

DeepSign: Deep on-line signature verification

R Tolosana, R Vera-Rodriguez, J Fierrez… - … and Identity Science, 2021 - ieeexplore.ieee.org
Deep learning has become a breathtaking technology in the last years, overcoming
traditional handcrafted approaches and even humans for many different tasks. However, in …

An overview of privacy-enhancing technologies in biometric recognition

P Melzi, C Rathgeb, R Tolosana… - ACM Computing …, 2024 - dl.acm.org
Privacy-enhancing technologies are technologies that implement fundamental data
protection principles. With respect to biometric recognition, different types of privacy …

[HTML][HTML] SVC-onGoing: Signature verification competition

R Tolosana, R Vera-Rodriguez, C Gonzalez-Garcia… - Pattern Recognition, 2022 - Elsevier
This article presents SVC-onGoing 1, an on-going competition for on-line signature
verification where researchers can easily benchmark their systems against the state of the …