50 years of biometric research: Accomplishments, challenges, and opportunities

[1]  Arun Ross,et al.  What Else Does Your Biometric Data Reveal? A Survey on Soft Biometrics , 2016, IEEE Transactions on Information Forensics and Security.

[2]  Anil K. Jain,et al.  Longitudinal study of fingerprint recognition , 2015, Proceedings of the National Academy of Sciences.

[3]  Anil K. Jain,et al.  Recognizing infants and toddlers using fingerprints: Increasing the vaccination coverage , 2014, IEEE International Joint Conference on Biometrics.

[4]  Arun Ross,et al.  A Survey on Anti-Spoofing Schemes for Fingerprint Recognition Systems , 2014 .

[5]  Ben D. Sawyer,et al.  Google Glass , 2014, Hum. Factors.

[6]  Stan Z. Li,et al.  Handbook of Biometric Anti-Spoofing , 2014, Advances in Computer Vision and Pattern Recognition.

[7]  Xiaogang Wang,et al.  Deep Learning Face Representation from Predicting 10,000 Classes , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[8]  Ming Yang,et al.  DeepFace: Closing the Gap to Human-Level Performance in Face Verification , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[9]  Vincent M. Stanford,et al.  Performance factor analysis for the 2012 NIST speaker recognition evaluation , 2014, INTERSPEECH.

[10]  Vincent M. Stanford,et al.  The 2021 NIST Speaker Recognition Evaluation , 2022, Odyssey.

[11]  Takayuki Yamada,et al.  Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity , 2013, Communications and Multimedia Security.

[12]  George W. Quinn,et al.  IREX VI : Temporal Stability of Iris Recognition Accuracy , 2013 .

[13]  Gabriel Gasque,et al.  Small molecule drug screening in Drosophila identifies the 5HT2A receptor as a feeding modulation target , 2013, Scientific Reports.

[14]  Paul Rayson,et al.  Who Am I? Analyzing Digital Personas in Cybercrime Investigations , 2013, Computer.

[15]  César A. Hidalgo,et al.  Unique in the Crowd: The privacy bounds of human mobility , 2013, Scientific Reports.

[16]  Ramesh Govindan,et al.  P3: Toward Privacy-Preserving Photo Sharing , 2013, NSDI.

[17]  Arun Ross,et al.  A survey on ear biometrics , 2013, CSUR.

[18]  Anil K. Jain,et al.  A Case Study on Unconstrained Facial Recognition Using the Boston Marathon Bombings Suspects , 2013 .

[19]  Arun Ross,et al.  Can facial cosmetics affect the matching accuracy of face recognition systems? , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[20]  Anil K. Jain,et al.  Face Recognition Performance: Role of Demographic Information , 2012, IEEE Transactions on Information Forensics and Security.

[21]  Sébastien Marcel,et al.  On the effectiveness of local binary patterns in face anti-spoofing , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).

[22]  Junjie Yan,et al.  A face antispoofing database with diverse attacks , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[23]  George W. Quinn,et al.  IREX III: Performance of Iris Identification Algorithms , 2012 .

[24]  Vinay Bettadapura,et al.  Face Expression Recognition and Analysis: The State of the Art , 2012, ArXiv.

[25]  Anil K. Jain,et al.  Altered Fingerprints: Analysis and Detection , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[26]  Sander Oude Elberink,et al.  Accuracy and Resolution of Kinect Depth Data for Indoor Mapping Applications , 2012, Sensors.

[27]  Dileepan Joseph,et al.  Toward a digital camera to rival the human eye , 2011, J. Electronic Imaging.

[28]  Arun Ross,et al.  Periocular Biometrics in the Visible Spectrum , 2011, IEEE Transactions on Information Forensics and Security.

[29]  Arun Ross,et al.  Visual Cryptography for Biometric Privacy , 2011, IEEE Transactions on Information Forensics and Security.

[30]  Sistema político,et al.  Unique Identification Authority of India , 2011 .

[31]  A. Zoubir,et al.  EURASIP Journal on Advances in Signal Processing , 2011 .

[32]  Yun Fu,et al.  Age Synthesis and Estimation via Faces: A Survey , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[33]  Yiying Tong,et al.  Age-Invariant Face Recognition , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[34]  Tomoyuki Suzuki,et al.  Challenges of image-sensor development , 2010, 2010 IEEE International Solid-State Circuits Conference - (ISSCC).

[35]  Nicolae Duta,et al.  A survey of biometric technology based on hand shape , 2009, Pattern Recognit..

[36]  Bruce A. Draper,et al.  A meta-analysis of face recognition covariates , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[37]  David Zhang,et al.  A survey of palmprint recognition , 2009, Pattern Recognit..

[38]  Patrick J. Flynn,et al.  Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches , 2009, ICB.

[39]  Bruce A. Draper,et al.  Factors that influence algorithm performance in the Face Recognition Grand Challenge , 2009, Comput. Vis. Image Underst..

[40]  Allen Y. Yang,et al.  Robust Face Recognition via Sparse Representation , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[41]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition, Second Edition , 2009 .

[42]  Carlos D. Castillo,et al.  Fake Finger Detection , 2009, Encyclopedia of Biometrics.

[43]  George W. Quinn,et al.  ELFT phase II :: an evaluation of automated latent fingerprint identification technologies , 2009 .

[44]  Arun Ross,et al.  An introduction to biometrics , 2008, ICPR 2008.

[45]  Elke Greifender,et al.  The History of Information Security: A Comprehensive Handbook , 2008 .

[46]  Mark R. Hawthorne Fingerprints: Analysis and Understanding , 2008 .

[47]  Karim Faez,et al.  Human Identification Based on Gait , 2008 .

[48]  R. Chellappa,et al.  Age progression in Human Faces : A Survey , 2008 .

[49]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[50]  Yong Wang,et al.  ISAR Imaging of Rotating Target with Equal Changing Acceleration Based on the Cubic Phase Function , 2008, EURASIP J. Adv. Signal Process..

[51]  Shengcai Liao,et al.  Illumination Invariant Face Recognition Using Near-Infrared Images , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[52]  Chris Roberts,et al.  Biometric attack vectors and defences , 2007, Comput. Secur..

[53]  Christophe Champod,et al.  Computation of Likelihood Ratios in Fingerprint Identification for Configurations of Any Number of Minutiæ , 2007, Journal of forensic sciences.

[54]  Anil K. Jain,et al.  Statistical Models for Assessing the Individuality of Fingerprints , 2005, IEEE Transactions on Information Forensics and Security.

[55]  James L. Wayman The scientific development of biometrics over the last 40 years , 2007 .

[56]  John Daugman,et al.  Probing the Uniqueness and Randomness of IrisCodes: Results From 200 Billion Iris Pair Comparisons , 2006, Proceedings of the IEEE.

[57]  Dario Maio,et al.  Fake finger detection by skin distortion analysis , 2006, IEEE Transactions on Information Forensics and Security.

[58]  Karl Ricanek,et al.  MORPH: a longitudinal image database of normal adult age-progression , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).

[59]  Rudolf Hauke,et al.  The Surround ImagerTM: A Multi-camera Touchless Device to Acquire 3D Rolled-Equivalent Fingerprints , 2006, ICB.

[60]  Kang Ryoung Park,et al.  Fake Iris Detection by Using Purkinje Image , 2006, ICB.

[61]  Arun Ross,et al.  Handbook of Multibiometrics , 2006, The Kluwer international series on biometrics.

[62]  Stephanie Schuckers,et al.  Time-series detection of perspiration as a liveness test in fingerprint devices , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[63]  Robert K. Rowe,et al.  Multispectral fingerprint imaging for spoof detection , 2005, SPIE Defense + Commercial Sensing.

[64]  David G. Lowe,et al.  Distinctive Image Features from Scale-Invariant Keypoints , 2004, International Journal of Computer Vision.

[65]  Tieniu Tan,et al.  Live face detection based on the analysis of Fourier spectra , 2004, SPIE Defense + Commercial Sensing.

[66]  Arun Ross,et al.  Biometric template selection and update: a case study in fingerprints , 2004, Pattern Recognit..

[67]  William E. Burr,et al.  Electronic Authentication Guideline | NIST , 2004 .

[68]  Craig I. Watson,et al.  Fingerprint Vendor Technology Evaluation 2003: Summary of Results and Analysis Report , 2004 .

[69]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[70]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[71]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[72]  L. O'Gorman,et al.  Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.

[73]  Thomas Vetter,et al.  Face Recognition Based on Fitting a 3D Morphable Model , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[74]  Lawrence O'Gorman,et al.  Innovations in fingerprint capture devices , 2003, Pattern Recognit..

[75]  John Daugman,et al.  The importance of being random: statistical principles of iris recognition , 2003, Pattern Recognit..

[76]  L. Weathered The innocence project , 2003 .

[77]  Sharath Pankanti,et al.  On the similarity of identical twin fingerprints , 2002, Pattern Recognit..

[78]  Matti Pietikäinen,et al.  Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[79]  Satoshi Hoshino,et al.  Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.

[80]  A. Barrett,et al.  Crime and Punishment in England: A Sourcebook , 2001 .

[81]  Paul A. Viola,et al.  Robust Real-Time Face Detection , 2001, Proceedings Eighth IEEE International Conference on Computer Vision. ICCV 2001.

[82]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[83]  David R. Ashbaugh,et al.  Quantitative-Qualitative Friction Ridge Analysis: An Introduction to Basic and Advanced Ridgeology , 1999 .

[84]  Sharath Pankanti,et al.  A Prototype Hand Geometry-based Verication System , 1999 .

[85]  G.E. Moore,et al.  Cramming More Components Onto Integrated Circuits , 1998, Proceedings of the IEEE.

[86]  Norbert Krüger,et al.  Face recognition by elastic bunch graph matching , 1997, Proceedings of International Conference on Image Processing.

[87]  David J. Kriegman,et al.  Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.

[88]  Penio S. Penev,et al.  Local feature analysis: A general statistical theory for object representation , 1996 .

[89]  John Daugman,et al.  High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..

[90]  M. Bannier [Aging of the face]. , 1993, Soins. Chirurgie.

[91]  W. Babler Embryologic development of epidermal ridges and their configurations. , 1991, Birth defects original article series.

[92]  M. Turk,et al.  Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.

[93]  L Sirovich,et al.  Low-dimensional procedure for the characterization of human faces. , 1987, Journal of the Optical Society of America. A, Optics and image science.

[94]  金出 武雄,et al.  Picture processing system by computer complex and recognition of human faces , 1974 .

[95]  MITCHELL TRAURING,et al.  Automatic Comparison of Finger-Ridge Patterns , 1963, Nature.

[96]  S. Pruzansky Pattern‐Matching Procedure for Automatic Talker Recognition , 1963 .

[97]  A. F. Adams,et al.  The Survey , 2021, Dyslexia in Higher Education.

[98]  Alphonse Bertillon,et al.  Signaletic instructions including the theory and practice of anthropometrical identification , 2022 .