All Stories

  1. Mitigate authentication attack risk on cancelable biometrics by leveraging attacker knowledge
  2. Fingerprint Spoof Generation Using Style Transfer
  3. A Comprehensive Comparison of CNN-Based Deep Learning Architectures for Fingerprint Authentication
  4. Explainable Presentation Attack Detection of Digital Fingerprints
  5. Direct RGB-D visual odometry with point features
  6. Digital fingerprint indexing using synthetic binary indexes
  7. Robust biometric scheme against replay attacks using one-time biometric templates
  8. Combining Trust Graphs and Keystroke Dynamics to Counter Fake Identities in Social Networks
  9. Developing consensus on core outcome sets of domains for acute, the transition from acute to chronic, recurrent/episodic, and chronic pain: results of the INTEGRATE-pain Delphi process
  10. A Comparative Study of Tools for Explicit Content Detection in Images
  11. Capture Biases in Fingerprint Systems
  12. Towards an Open-source Digital Investigation Platform
  13. File type identification tools for digital investigations
  14. Deep features fusion for user authentication based on human activity
  15. RGB-D Visual Odometry via Low Order Gaussian Gradient Metrics
  16. Comparative study of minutiae selection methods for digital fingerprints
  17. Digitally Synthetized Fingerprint Spoofs: A Threat For Anti-Spoofing Systems?
  18. Keystroke Dynamics based User Authentication using Deep Learning Neural Networks
  19. Case report of multiple rectal neuroendocrine tumors in a context of ulcerative colitis
  20. Impact Of Environmental Conditions On Fingerprint Systems Performance
  21. Face Transparent User Authentication Respecting Privacy
  22. How Artificial Intelligence can be used for Behavioral Identification?
  23. Keystroke Dynamics Classification Based On LSTM and BLSTM Models
  24. Biométrie et applications
  25. Classifying Biometric Systems Users among the Doddington Zoo: Application to Keystroke Dynamics
  26. Privacy Aura for Transparent Authentication on Multiple Smart Devices
  27. Logical Attacks and Countermeasures for Fingerprint On-Card-Comparison Systems
  28. Splitting Wolves Category in Doddington Zoo: Impacts on Keystroke Dynamics
  29. When my Behavior Enhances my Smartphone Security
  30. Fusion of Digital Fingerprint Quality Assessment Metrics
  31. Identity Verification and Fraud Detection During Online Exams with a Privacy Compliant Biometric System
  32. GREYC-Hashing: Combining biometrics and secret for enhancing the security of protected templates
  33. Statistical modeling of keystroke dynamics samples for the generation of synthetic datasets
  34. Adaptive Biometric Systems
  35. Comparative Study of Fingerprint Database Indexing Methods
  36. My Behavior is my Privacy & Secure Password !
  37. Vulnerability of Adaptive Strategies of Keystroke Dynamics Based Authentication Against Different Attack Types
  38. Analysis of Doddington zoo classification for user dependent template update: Application to keystroke dynamics recognition
  39. Double serial adaptation mechanism for keystroke dynamics authentication based on a single password
  40. Keystroke Dynamics Anonymization System
  41. Analysis of Keystroke Dynamics for the Generation of Synthetic Datasets
  42. Cybersecurity & Biometrics Track Chair Message
  43. Enhancing the Security of Transformation Based Biometric Template Protection Schemes
  44. Rhu Keystroke Touchscreen Benchmark
  45. User Dependent Template Update for Keystroke Dynamics Recognition
  46. A New Black Box Evaluation Protocol for Biometric Systems
  47. A comparative study of card-not-present e-commerce architectures with card schemes: What about privacy?
  48. Adaptive Biometric Strategy using Doddington Zoo Classification of User’s Keystroke Dynamics
  49. Performance evaluation of no-reference image quality metrics for face biometric images
  50. Comparative Study of Digital Fingerprint Quality Assessment Metrics
  51. Evaluation of Biometric Template Protection Schemes based on a Transformation
  52. Privacy Compliant Multi-biometric Authentication on Smartphones
  53. Towards a Personal Identity Code Respecting Privacy
  54. Towards an Optimal Template Reduction for Securing Embedded Fingerprint Devices
  55. Retrieving dates in smart card dumps is as hard as finding a needle in a haystack
  56. Global visual saliency: Geometric and colorimetrie saliency fusion and its applications for 3D colored meshes
  57. Contrasting False Identities in Social Networks by Trust Chains and Biometric Reinforcement
  58. Can no-reference image quality metrics assess visible wavelength iris sample quality?
  59. Memory carving can finally unveil your embedded personal data
  60. Fingerprint Class Recognition for Securing EMV Transaction
  61. Privacy Preserving Transparent Mobile Authentication
  62. No-Reference Learning-Based and Human Visual-Based Image Quality Assessment Metric
  63. Fingerprint Quality Assessment: Matching Performance and Image Quality
  64. An improved 3-step contactless fingerprint image enhancement approach for minutiae detection
  65. Literature review of fingerprint quality assessment and its evaluation
  66. In What Way Is It Possible to Impersonate You Bypassing Fingerprint Sensors?
  67. Full-reference saliency-based 3D mesh quality assessment index
  68. The Influence of Fingerprint Image Degradations on the Performance of Biometric System and Quality Assessment
  69. Synchronous One Time Biometrics with Pattern Based Authentication
  70. Keystroke template update with adapted thresholds
  71. Comparative study on texture features for fingerprint recognition: application to the BioHashing template protection scheme
  72. Image-based attributes of multi-modality image quality for contactless biometric samples
  73. A Continuous LoA Compliant Trust Evaluation Method
  74. An Observe-and-Detect Methodology for the Security and Functional Testing of Smart Card Applications
  75. Memory Carving in Embedded Devices: Separate the Wheat from the Chaff
  76. A review on the public benchmark databases for static keystroke dynamics
  77. Application of new alteration attack on biometric authentication systems
  78. Fingerprint Quality Assessment with Multiple Segmentation
  79. Multi-scale mesh saliency with local adaptive patches for viewpoint selection
  80. Multi-scale saliency of 3D colored meshes
  81. Image Watermarking with Biometric Data for Copyright Protection
  82. Generation of Local and Expected Behaviors of a Smart Card Application to Detect Software Anomaly
  83. Vulnerabilities of fuzzy vault schemes using biometric data with traces
  84. Mesh saliency with adaptive local patches
  85. Comparative study of minutiae selection algorithms for ISO fingerprint templates
  86. Keystroke dynamics performance enhancement with soft biometrics
  87. Blind minutiae selection for standard minutiae templates
  88. Evaluation metric of an image understanding result
  89. Quality assessment of image-based biometric information
  90. Comparison of no-reference image quality assessment machine learning-based algorithms on compressed images
  91. Local user-centric identity management
  92. EvaBio a New Modular Platform to Evaluate Biometric System
  93. EvaBio Platform for the Evaluation Biometric System - Application to the Optimization of the Enrollment Process for Fingerprints Devices
  94. Fingerprint Quality Assessment Combining Blind Image Quality, Texture and Minutiae Features
  95. Quality Assessment of Fingerprints with Minutiae Delaunay Triangulation
  96. Soft biometrics for keystroke dynamics: Profiling individuals while typing passwords
  97. Analysis of embedded applications by evolutionary fuzzing
  98. Blind Prediction of Natural Video Quality
  99. One-Time Biometrics for Online Banking and Electronic Payment Authentication
  100. An integrated framework combining Bio-Hashed minutiae template and PKCS15 compliant card for a better secure management of fingerprint cancelable templates
  101. A contactless e-health information system with privacy
  102. Operational bio-hash to preserve privacy of fingerprint minutiae templates
  103. Online user's registration respecting privacy
  104. Biometric secret path for mobile user authentication: A preliminary study
  105. Security and performance evaluation platform of biometric match on card
  106. A New Protocol to Evaluate the Resistance of Template Update Systems against Zero-Effort Attacks
  107. Parametrization of an image understanding quality metric with a subjective evaluation
  108. Fast computation of the performance evaluation of biometric systems: Application to multibiometrics
  109. Multibiometrics
  110. Performance Evaluation of Biometric Systems
  111. Soft Biometrics for Keystroke Dynamics
  112. A mobile contactless point of sale enhanced by the NFC and biometric technologies
  113. A Privacy Preserving E-Payment Architecture
  114. An e-payment Architecture Ensuring a High Level of Privacy Protection
  115. Preimage Attack on BioHashing
  116. Optimizing Multiscale SSIM for Compression via MLDS
  117. Evaluation of Biometric Systems
  118. Hybrid template update system for unimodal biometric systems
  119. Blind Image Quality Assessment: A Natural Scene Statistics Approach in the DCT Domain
  120. Service provider authentication assurance
  121. Web-Based Benchmark for Keystroke Dynamics Biometric Systems: A Statistical Analysis
  122. Can Chronological Information be Used as a Soft Biometric in Keystroke Dynamics?
  123. Texture based fingerprint BioHashing: Attacks and robustness
  124. Security EvaBio: An analysis tool for the security evaluation of biometric authentication systems
  125. Machine learning to design full-reference image quality assessment algorithm
  126. Genetic programming for multibiometrics
  127. Enhancing the privacy of electronic passports
  128. Towards the Security Evaluation of Biometric Authentication Systems
  129. A new soft biometric approach for keystroke dynamics based on gender recognition
  130. Evaluation of biometric systems: a study of users' acceptance and satisfaction
  131. Evaluation of Cancelable Biometric Systems: Application to Finger-Knuckle-Prints
  132. Unconstrained keystroke dynamics authentication with shared secret
  133. DCT statistics model-based blind image quality assessment
  134. Calibrating MS-SSIM for compression distortions using MLDS
  135. An Overview on Privacy Preserving Biometrics
  136. Toward a distributed benchmarking tool for biometrics
  137. Keystroke Dynamics Overview
  138. Study of the Robustness of a Cancelable Biometric System
  139. Analysis of template update strategies for keystroke dynamics
  140. A SVM-based model for the evaluation of biometric sample quality
  141. Towards a sensor for detecting human presence and characterizing activity
  142. A study of users' acceptance and satisfaction of biometric systems
  143. Natural DCT statistics approach to no-reference image quality assessment
  144. Study on Color Spaces for Single Image Enrolment Face Authentication
  145. Low Cost and Usable Multimodal Biometric System Based on Keystroke Dynamics and 2D Face Recognition
  146. Biohashing for Securing Minutiae Template
  147. Editorial
  148. Comparative study of background subtraction algorithms
  149. Fast learning for multibiometrics systems using genetic algorithms
  150. Preface
  151. A DCT Statistics-Based Blind Image Quality Index
  152. Comparative study of localization metrics for the evaluation of image interpretation systems
  153. Comparison of image quality assessment algorithms on compressed images
  154. A Low-Cost and Secure Solution for e-Commerce
  155. Evaluation of Human Detection Algorithms in Image Sequences
  156. Human Detection with a Multi-sensors Stereovision System
  157. Color VQ-Based Image Compression by Manifold Learning
  158. Vision-Based System for Human Detection and Tracking in Indoor Environment
  159. Evaluation metric for image understanding
  160. Keystroke dynamics with low constraints SVM based passphrase enrollment
  161. GREYC keystroke: A benchmark for keystroke dynamics biometric systems
  162. Comparative Study of Local Descriptors for Measuring Object Taxonomy
  163. A General Framework for a Robust Human Detection in Images Sequences
  164. Emerging trends in biometric authentication
  165. Abnormal events detection based on spatio-temporal co-occurences
  166. Color image segmentation using morphological clustering and fusion with automatic scale selection
  167. Keystroke dynamics authentication for collaborative systems
  168. Palm Vein Verification System Based on SIFT Matching
  169. Similarity-based matching for face authentication
  170. Review and Evaluation of Commonly-Implemented Background Subtraction Algorithms
  171. Optical sensor system using computer vision for the level measurement in oil tankers
  172. Machine Learning in Image Processing
  173. Secure payment with NFC mobile phone in the SmartTouch project
  174. An e-banking platform for collaborative work between education, industry and research
  175. Comparative study of global invariant descriptors for object recognition
  176. TABU SEARCH MODEL SELECTION FOR SVM
  177. A color image quality assessment using a reduced-reference image machine learning expert
  178. Evaluation Protocol for Localization Metrics
  179. A Real Time Human Detection System Based on Far Infrared Vision
  180. Comparative Study of Contour Detection Evaluation Criteria Based on Dissimilarity Measures
  181. Face Authentication for Banking
  182. Optimization-Based Image Segmentation by Genetic Algorithms
  183. Segmentation Framework Based on Label Field Fusion
  184. Maximum likelihood difference scaling of image quality in compression-degraded images
  185. Comparative study of metrics for evaluation of object localisation by bounding boxes.
  186. Comparative Study on Foreground Detection Algorithms for Human Detection
  187. Matching between telemetric measures and images for mobile robotics
  188. Grape Detection By Image Processing
  189. Study of the influence of parameter settings for local invariant object recognition
  190. Towards a New Tool for the Evaluation of the Quality of Ultrasound Compressed Images
  191. Unsupervised Performance Evaluation of Image Segmentation
  192. A support vector machine as an estimator of mountain papaya ripeness using resonant frequency or frequency centroid
  193. Comparative study of invariant descriptors for face recognition
  194. Evaluation methodologies of image processing: An overview
  195. Adaptative evaluation of image segmentation results
  196. A New Model Selection Method for SVM
  197. Speed-Up LOO-CV with SVM Classifier
  198. On the determination of 3D trajectory of moving targets by stereovision
  199. A tele-operated mobile ultrasound scanner using a light-weight robot
  200. A novel approach to complex target recognition using RCS wavelet decomposition
  201. Texture Detection for Image Analysis
  202. Segmentation Evaluation Using a Support Vector Machine
  203. Evolutionary Computation Approaches for Shape Modelling and Fitting
  204. 2D color shape recognition using Zernike moments
  205. Evaluation of the Quality of Ultrasound Image Compression by Fusion of Criteria with a Genetic Algorithm
  206. Evaluation of the quality of ultrasound image compression for a robotic tele-echographic system
  207. Object Recognition Using Local Characterisation and Zernike Moments
  208. Combination of Multiple Pixel Classifiers for Microscopic Image Segmentation
  209. Fast Pixel Classification by SVM Using Vector Quantization, Tabu Search and Hybrid Color Space
  210. Calibration and quality control of cherries by artificial vision
  211. 3D shape reconstruction of template models using genetic algorithms
  212. Unsupervised evaluation of image segmentation application to multi-spectral images
  213. SVM training time reduction using vector quantization
  214. Visual masking model for perceptual color image compression
  215. Calibration and quality control of cherries by artificial vision
  216. Toward a complete adaptive analysis of an image
  217. <title>Edge classification of color images based on psychophysical codebook construction</title>
  218. Multiagent systems and neural networks of a distributed architecture for target identification of air images
  219. Multi-agent systems and neural networks for automatic target recognition on air images
  220. Influence of chromatic changes on the perception of color image quality
  221. Target detection and identification using neural networks and multi-agents systems
  222. Texture analysis of an image by using a rotation-invariant model
  223. <title>Fast vector quantization algorithm preserving color image quality</title>
  224. <title>Perceptual distortion analysis of color image VQ-based coding</title>
  225. Unsupervised and Supervised Image Segmentation Evaluation
  226. Security for Electronic Commerce
  227. Biometric Authentication
  228. Unsupervised and Supervised Image Segmentation Evaluation
  229. Automation of the Volumetric Models Construction
  230. A New Supervised Evaluation Criterion for Region Based Segmentation Methods
  231. Evaluation of Medical Image Compression
  232. A vector quantization algorithm based on the nearest neighbor of the furthest color
  233. Minimization of color image entropy through colorimetric transformation
  234. Quantifying perceptual image quality by difference scaling
  235. Multi-Agent Based Prototyping of Agriculture Robots
  236. Multi-agents system for image understanding
  237. Application of telerobotic computer vision system in manufacturing control process
  238. Genetic fusion: application to multi-components image segmentation
  239. Comparative survey of ultrasound images compression methods dedicated to a tele-echography robotic system
  240. Correction of zoomed morphology-based interpolation of contours
  241. Adaptive segmentation system
  242. Unsupervised clustering method with optimal estimation of the number of clusters: application to image segmentation
  243. An EA Multi-model Selection for SVM Multiclass Schemes
  244. Fusion of SVM-Based Microscopic Color Images Through Colorimetric Transformation
  245. A new visual masking tool for JPEG2000