The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The field of biometrics has evolved considerably over the past decade. This is being reflected both in the academic literature as well as in civilian and military applications where biometric solutions are being increasingly deployed. Consequently, a number of exciting research problems are being addressed by the broader biometrics community. The International Conference on Biometrics (ICB) has been...
Given a common dataset, two methods operating on that dataset and reported equal-error rate (EER) for each method, then we can estimate whether the two methods differ significantly at the threshold leading to the EER. This enables the calculation of a boundary on the significance for methods where the significance was not reported in the original paper or to compare new methods to older ones by evaluating...
Biometric recognition requires that the biometric characteristics used for the verification should be unique among individuals. The purpose of this study is to verify the individuality of finger vein, a new trait with superiority on accuracy and security. To carry out the research, we construct a large-scale finger vein database consisting of 710,399 images from 363,703 fingers. We adopt a score level...
Biometric recognition in totally wild conditions, such as the observed in visual surveillance scenarios has not been achieved yet. The ICB-RW competition was promoted to support this endeavor, being the first biometric challenge carried out in data that realistically result from surveillance scenarios. The competition relied on an innovative master-slave surveillance system for the acquisition of...
State-of-the-art methods have reported very high performance on facial expression detection. However, nearly all these previous work was conducted in strictly controlled environment, what's more, effects of imbalanced data have been neglected. A new database, RAF-DB, is constructed to provide abundant images with expression labels from different people in different real-world conditions. Annotation...
This article reports and summarizes the results of a competition on sclera segmentation and recognition benchmarking, called Sclera Segmentation and Recognition Benchmarking Competition 2016 (SSRBC 2016). It was organized in the context of the 9th IAPR International Conference on Biometrics (ICB 2016). The goal of this competition was to record the recent developments in sclera segmentation and recognition,...
Current deep learning methods have achieved human-level performance on Labeled Faces in the Wild (LFW) database, but we think it is because that the limited number of pairs on LFW do not capture the real difficulty of large-scale unconstrained face verification problem. Besides the intra-class variations like pose, illumination, occlusion and expression, highly visually similarity of different persons'...
Recently, the use of brain activity as biometric trait for automatic users recognition has been investigated. EEG (Electroencephalography) signal is more often used in the medical field for diagnostic purposes. However, early EEG studies adopted similar signal properties and processing tools to study individual distinctive characteristics. As a matter of fact, features related mostly to a single region...
This paper presents a unique analysis of post-mortem human iris recognition. Post-mortem human iris images were collected at the university mortuary in three sessions separated by approximately 11 hours, with the first session organized from 5 to 7 hours after demise. Analysis performed for four independent iris recognition methods shows that the common claim of the iris being useless for biometric...
Wide acceptance of biometrics as an authentication mode has led to investigation of multiple modalities such as face, periocular, iris for the long term robustness. Due to various deformities arising out of deteriorating health, need for enhancing the beauty by choice or to fix the injury as a result of trauma or aging, people tend to undergo surgery. However, such surgeries do not guarantee the restoration...
A fingerprint presentation attacks detector (FPAD) is designed to obtain a certain performance regardless of the targeted user population. However, two recent works on facial traits showed that a PAD system can exploit very useful information from the targeted user population. In this paper, we explored the existence of that kind of information in fingerprints when textural features are adopted. We...
Face spoofing detection (i.e. face anti-spoofing) is emerging as a new research area and has already attracted a good number of works during the past five years. This paper addresses for the first time the key problem of the variation in the input image quality and resolution in face anti-spoofing. In contrast to most existing works aiming at extracting multiscale descriptors from the original face...
With explosive growth in fingerprint database, Automatic Fingerprint Identification System (AFIS) has become more difficult than ever. Consequently, it is necessary to get an effective and discriminative fingerprint feature binary representation. In this paper, we firstly analyze the characteristic of Minutia Cylinder Code (MCC) representation to find that it is strongly bit-correlated and with a...
Many studies show the effectiveness of gait in surveillance and access control scenarios. However, appearance changes due to walking direction changes impose a challenge for gait recognition techniques that assume people only walk in a straight line. In this paper, the effect of walking along straight and curved path is studied by proposing a practical technique which is based on the three key frames...
Generative Bayesian models have exhibited good performance on the face verification problem, i.e., determining whether two faces are from the same person. As one of the most representative methods, the Joint Bayesian (JB) model represents two faces jointly by introducing some appropriate priors, providing better separability between different face classes. The EM-like learning algorithm of the JB...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.