50 years of biometric research: Accomplishments, challenges, and opportunities

AK Jain, K Nandakumar, A Ross - Pattern recognition letters, 2016 - Elsevier
Biometric recognition refers to the automated recognition of individuals based on their
biological and behavioral characteristics such as fingerprint, face, iris, and voice. The first …

Multi-factor authentication: A survey

A Ometov, S Bezzateev, N Mäkitalo, S Andreev… - Cryptography, 2018 - mdpi.com
Today, digitalization decisively penetrates all the sides of the modern society. One of the key
enablers to maintain this process secure is authentication. It covers many different areas of a …

Deepfakes and beyond: A survey of face manipulation and fake detection

R Tolosana, R Vera-Rodriguez, J Fierrez, A Morales… - Information …, 2020 - Elsevier
The free access to large-scale public databases, together with the fast progress of deep
learning techniques, in particular Generative Adversarial Networks, have led to the …

Biometric face presentation attack detection with multi-channel convolutional neural network

A George, Z Mostaani, D Geissenbuhler… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Face recognition is a mainstream biometric authentication method. However, the
vulnerability to presentation attacks (aka spoofing) limits its usability in unsupervised …

Presentation attack detection methods for face recognition systems: A comprehensive survey

R Ramachandra, C Busch - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
The vulnerability of face recognition systems to presentation attacks (also known as direct
attacks or spoof attacks) has received a great deal of interest from the biometric community …

Use of a capsule network to detect fake images and videos

HH Nguyen, J Yamagishi, I Echizen - arxiv preprint arxiv:1910.12467, 2019 - arxiv.org
The revolution in computer hardware, especially in graphics processing units and tensor
processing units, has enabled significant advances in computer graphics and artificial …

Convolutional neural network for finger-vein-based biometric identification

R Das, E Piciucco, E Maiorana… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The use of human finger-vein traits for the purpose of automatic user recognition has gained
a lot of attention in recent years. Current state-of-the-art techniques can provide relatively …

Biometric antispoofing methods: A survey in face recognition

J Galbally, S Marcel, J Fierrez - Ieee Access, 2014 - ieeexplore.ieee.org
In recent decades, we have witnessed the evolution of biometric technology from the first
pioneering works in face and voice recognition to the current state of development wherein a …

Speaker identification through artificial intelligence techniques: A comprehensive review and research challenges

R Jahangir, YW Teh, HF Nweke, G Mujtaba… - Expert Systems with …, 2021 - Elsevier
Speech is a powerful medium of communication that always convey rich and useful
information, such as gender, accent, and other unique characteristics of a speaker. These …

Learning temporal features using LSTM-CNN architecture for face anti-spoofing

Z Xu, S Li, W Deng - 2015 3rd IAPR asian conference on …, 2015 - ieeexplore.ieee.org
Temporal features is important for face anti-spoofing. Unfortunately existing methods have
limitations to explore such temporal features. In this work, we propose a deep neural …