1,157
Views
6
CrossRef citations to date
0
Altmetric
Review Article

Challenges and opportunities in biometric security: A survey

ORCID Icon &

References

  • Adik, C., Waze, A., & Tendulkar, S. (2019). Fingerprint and face spoof detection using deep learning. International Journal of Innovative Research in Technology, 5(6), 187–189.  ijirt.org/Article?manuscript=147256
  • Al Waisy, A. S., Qahwaji, R., Ipson, S., & Al-Fahdawi, S. A multimodal biometric system for personal identification based on deep learning approaches .In 2017 seventh international conference on emerging security technologies (EST), Canterbury,UK,2017,pp. 163–168.
  • Amira, M., Eldin, A., & Wahdan, A. (2011). Fingerprint recognition. Advanced biometric technologies, 210–224. https://doi.org/https://doi.org/10.5772/23476
  • Arora, S., & Bhatia, M. P. S. (2020). Fingerprint spoofing detection to improve customer security in mobile financial applications using deep learning. Arabian journal for science and engineering, 45(10), 2847–2863. https://doi.org/https://doi.org/10.1007/s13369-019-04190-1
  • Atoum, Y., Liu, Y., Jourabloo, A., & Liu, X. Faceanti-spoofing using patch and depth-based CNNs. In 2017 IEEE International joint conference on biometrics (IJCB), Denver, CO, 2017, pp. 319–328.
  • Barrett, D. One surveillance camera for every 11 people in Britain, says cctv survey, (The Telegraph),2013. telegraph.co.uk. http://www.telegraph.co.uk/technology/10172298/One- surveillance- camera- for- every- 11- people- in- Britain- says-CCTV-survey.html (accessed 24.03.16).
  • Bashbaghi, S., Granger, E., Sabourin, R., & Parchami, A. Deep Learning Architectures for Face Recognition in Video Surveillance. arXiv:1802.09990,2018
  • Bowyer, K. W., & Doyle, J. S. (2014). Cosmetic contact lenses and iris recognition spoofing. Computer, 47(5), 96–98.
  • Cao, K., & Jain, A. K. Automated latent fingerprint recognition. in ieee transactions on pattern analysis and machine intelligence. IEEE transactions on pattern analysis and machine intelligence. 414:1 April 788–800 2019;https://doi.org/https://doi.org/10.1109/TPAMI.2018.2818162.
  • Chen, D., Cao, X., Wang, L., Wen, F., & Jian, S. (2012). Bayesian face revisited: A joint formulation. European Conference on Computer Vision, Springer, 7574, pp 566-579.
  • Cho, M., & Jeong, Y. (2014). Face recognition performance comparison of fake faces with real faces in relation to lighting. J. Internet Serv. Inf. Security., 4(4), 82:90. https://doi.org/https://doi.org/10.22667/JISIS.2014.11.31.082
  • Chugh, T., Cao, K., & Jain, A. (2018). Fingerprint spoof buster: Use of minutiae-centered patches. IEEE, Trans. Inf. Forensics Security, 13(9), 2190–2202. https://doi.org/https://doi.org/10.1109/TIFS.2018.2812193
  • CVRL.Cross-Sensor Iris, N. D. Dataset. Computer Vision Research Lab,University of Notre Dame. https://sites.google.com/a/nd.edu/public-cvrl/data-sets. 2013.
  • De Souza, G. B., Papa, J. P., & Marana, A. N. On the Learning of Deep Local Features for Robust Face Spoofing Detection. arXiv:1806.07492v2 [cs.CV],11 Oct 2018. Proceedings of 31st Conference on Graphics, Patterns and Images (SIBGRAPI) 2018.
  • Dian, L., & Dongmei, S. Contactless palmprintrecognition based on convolutional neural network. In Proceedings of the IEEE 13th international conference on signal processing (ICSP’16), 2016, pp.1363–1367. Chengdu, China.
  • Ding, S., Zhu, H., Jia, W., & Su, C. (.2011). A survey on feature extraction for pattern recognition. Artificial Intelligence Review, 37(4), 169–180. https://doi.org/https://doi.org/10.1007/s10462-011-9225-y
  • Galbally, J., Alonso-Fernandez, F., Fierrez, J., & Ortega-Garcia, J. (2012). A high performance fingerprint liveness detection method based on quality related features. Future Generation Computer Systems., 28(1), 311–321. https://doi.org/https://doi.org/10.1016/j.future.2010.11.024
  • Galbally, J., & Sébastien, M. Face Anti-Spoofing Based on General Image Quality Assessment. In Proceedings - International Conference on Pattern Recognition. 2014, pp. 1173–1178. Stockholm, Sweden.
  • Gangwar, A., & Joshi, A. DeepIrisNet: Deep iris representation with application in iris recognition and cross-sensor iris recognition. In Proceedings of the IEEE international conference on image processing, Phoenix, AZ, USA, 25–18 September 2016; pp. 2301–2305.
  • Garcia-Romero, D., Zhang, X., McCree, A., & Povey, D. Improving speaker recognition performance in the domain adaptation challenge using deep neural networks. In Proceedings of the IEEE spoken language technology workshop (SLT’14). IEEE,2014, pp. 378–383
  • Garris, M. D., & McCabe, R. M. NIST Special Database 27: Fingerprint Minutiae from Latent and Matching Tenprint Images. Technical Report 6534. NIST,2000.
  • Geoffrey, H. A. (2010). Practical guide to training restricted Boltzmann machines. Momentum, 9(1), 926. https://doi.org/https://doi.org/10.1007/978-3-642-35289-8_32
  • Ghiani, L., Yambay, D., Mura, V., Tocco, S., Marcialis,G., Roli,F., Schuckcrs, S.  (2013). LivDet 2013 Fingerprint Liveness Detection Competition 2013. In 2013 International Conference on Biometrics (ICB), Madrid: IEEE, pp. 1-6. doi: https://doi.org/10.1109/ICB.2013.6613027.
  • Gotardo, P., Riviere, J., Bradley, D., Ghosh, A., & Beeler, T. (2018). Practical dynamic facial appearance modeling and acquisition. ACM, Trans. Graph, 37(6), 1–13. https://doi.org/https://doi.org/10.1145/3272127.3275073
  • Gupta, P., Behera, S., Vatsa, M., & Singh, R. On iris spoofing using print attack. In 2014 22nd international conference on pattern recognition, stockholm, 2014, pp. 1681–1686. Stockholm, Sweden.
  • Harjoko, A., Hartati, S., & Dwiyasa, H. (2009). A method for iris recognition based on 1D coiflet wavelet. World Acad. Sci. Eng. Technol., 56(8), 126–129. https://doi.org/https://doi.org/10.5281/zenodo.1079934
  • Hashim, A. T., & Saleh, Z. A. (2018). Visual Cryptography and CSK for biometric template security. Journal of Engineering and Applied Sciences, 13(18), 7642:7647. https://doi.org/https://doi.org/10.36478/jeasci.2018.7642.7647
  • Hasnat, A., Bohn, J., Milgram, J., Gentric, S., & Chen, L. DeepVisage:Making face recognition simple yet with powerful generalization skills. arXiv:1703.08388v2,2017.
  • Hassaballah, M., & Aly, S. (2015). Face recognition: Challenges, achievements and future directions. IET Computer Vision, 9(4), 614–626. https://doi.org/https://doi.org/10.1049/iet-cvi.2014.0084
  • Hoffman, S., Sharma, R., & Ross, A. Convolutional neural networks for iris presentation attack detection: Toward cross-dataset and cross-sensor generalization. In The IEEE conference on computer vision and pattern recognition (CVPR) workshops, 2018. Salt Lake City, UT, USA.
  • Huang, G. B., Ramesh, M., Berg, T., & Learned-Miller, E. Labeled Faces in the Wild: A Database for Studying Face Recognition in Unconstrained Environments. Technical Report 07–49, University of Massachusetts 2007.
  • Huang, H., Liu, S., Zheng, H., Ni, L., Zhang, Y., & Li, W. Deepvein: Novel finger vein verification methods based on deep convolutional neural networks. In IEEE international conference on identity, security and behavior analysis, 2017. New Delhi, India.
  • Ilya, S. Training Recurrent Neural Networks. Ph.D. Dissertation.University of Toronto, 2013. University of Toronto Computer Center Toronto, Canada.
  • Jain, A., Hong, L., & Pankanti, S. (2001). Biometric Identification. Information Systems Security, 43(2), 90–98. https://doi.org/https://doi.org/10.1145/328236.328110
  • Jain, A., Nandakumar, K., & Ross, A. (2016). 50 years of biometric research: Accomplishments, challenges, and opportunities. Pattern Recognition Letters, 79, 80–105. https://doi.org/https://doi.org/10.1016/j.patrec.2015.12.013
  • Jalali, A., Mallipeddi, R., & Lee, M. Deformation invariant and contactless palmprint recognition using convolutional neural network. In proceedings of the 3rd international conference on human-agent interaction. Korea: ACM, 2015, pp. 209–212.
  • Johnson, P. A., Lopez-Meyer, P., Sazonova, N., & Hua, F., Schuckers Quality in face and iris research ensemble (Q-FIRE). In Proceedings of the IEEE 4th International Conference on Biometrics: Theory Applications and Systems (BTAS’10). Washington, DC, USA: IEEE,2010,pp. 1–6.
  • Kenny, P., Gupta, V., Stafylakis, T., Ouellet, P., & Alam, J. Deep neural networks for extracting Baum-Welch statistics for speaker recognition. In Proceedings of the Odyssey Conference, 2014, pp 293–298. Finland.
  • Kim, R. A., Nguyen, D. S., Owais, P. H., Park, M., & Iris, K. R. (2018). DenseNet: Robust iris segmentation using densely connected fully convolutional networks in the images by visible light and near-infrared light camera sensors. Sensors Basel, 18(5), 1501. https://doi.org/https://doi.org/10.3390/s18051501
  • Klontz, J. C., & Jain, A. K., A Case Study on Unconstrained Facial Recognition Using the Boston Marathon Bombings Suspects, Technical Report MSU-CSE-13-4, Michigan State University, 2013.
  • Kollreider, K., Fronthaler, H., & Bigun, J. (2009). Non-intrusive liveness detection by face images. Image and Vision Computing, 27(3), 233–244. https://doi.org/https://doi.org/10.1016/j.imavis.2007.05.004
  • Krizhevsky, A., Sutskever, I., & Hinton, G. (2017). ImageNet classification with deep convolutional neural networks. Communications of the ACM, 60(6), 84–90. https://doi.org/https://doi.org/10.1145/3065386
  • Kulkarni, H. (2018). Deep Learning for Facial. Recognition, Ryerson University.
  • Kumar, A. and Passi, A. (2010). Comparison and combination of iris matchers for reliable personal authentication. Pattern Recognition,43(3),1016–1026.
  • Kumar, J., Arun,Chalamala, S., & Jami, S. Securing face templates using deep convolutional neural network and random projection. In 2019 IEEE international conference on consumer electronics (ICCE),2019, pp. 1–6. Las Vegas, NV, USA, USA.
  • Kuo, C. (2016). Understanding convolutional neural networks with a mathematical model. J. Vis. Commun. Image, 41,1–21 . https://doi.org/https://doi.org/10.1016/j.jvcir.2016.11.003
  • Lakshminarayana, N. N., Narayan, N., Napp, N., Setlur, S., & Govindaraju, V. A discriminative spatio-temporal mapping of face for liveness detection. In Proceedings of the 2017 IEEE international conference on identity, security and behavior analysis, ISBA 2017, New Delhi, India, 22–24 February 2017.
  • Lefohn, A., Budge, B., Shirley, P., Caruso, R., & Reinhard, E. (2013). An Ocularist’s Approach to Human Iris Synthesis. Computer Graphics, 23(6). https://doi.org/https://doi.org/10.1109/MCG.2003.1242384
  • Lei, L., Zia, Z., Jiang, X., Roli, F., & Feng, X. Face Presentation Attack Detection in Learned Color-liked Space. arXiv:1810.13170v2 [cs.CV],2018.
  • Lior, W., Hassner, T., & Itay, M. Face recognition in unconstrained videos with matched background similarity. In proceedings of the IEEE conference on computer vision and pattern recognition (CVPR’11),2011, pp. 529–534. Providence, RI, USA.
  • Liu, J., Deng, Y., & Huang, C. (2015). Targeting ultimate accuracy: Face recognition via deep embedding. arXiv:1506.07310.
  • Liu, L., Xie, T., Yan, J. B., Li, W., & Lu, P. Q. (2013). HZ. An Algorithm for finger-vein segmentation based on modified repeated line tracking. Imaging Sci. J, 61(6), 491–502. https://doi.org/https://doi.org/10.1179/1743131X12Y.0000000013
  • Liu, Y., Ling, J., Liu, Z., Shen, J., & Gao, C. (2017). Finger vein secure biometric template generation based on deep learning. Soft Computing, 22,2257–2265. https://doi.org/https://doi.org/10.1007/s00500-017-2983-y
  • Maio, D., Maltoni, D., Cappelli, R., Wayman, J., & Jain, A. K. FVC2002: Second fingerprint verification competition. In Proceedings of the 16th International Conference on Pattern Recognition. 2002, pp. 811–814. Quebec City, Quebec, Canada.
  • Maram, A., & Lamiaa, E. (2018). Convolutional neural network based feature extraction for IRIS recognition. International Journal of Computer Science and Information Technology, 10(2), 65–78. https://doi.org/https://doi.org/10.5121/ijcsit.2018.10206
  • Marasco, E., & Ross, A. (2014). A survey on antispoofing schemes for fingerprint recognition systems. ACM Computing Surveys, 47(2), 1–36. https://doi.org/https://doi.org/10.1145/2617756
  • Masi, I., Rawls, S., Medioni, G., & Natarajan, P. Pose-aware face recognition in the wild. In Proceedings of the IEEE conference on computer vision and pattern recognition, 2016, pp.4838–4846. Las Vegas, NV, USA.
  • Matthias, V., Pedro, T. E. L., & Marcel, S. Cross-Database evaluation with an open finger vein sensor. In IEEE workshop on biometric measurements and systems for security and medical applications (BioMS),2014. Rome, Italy.
  • Menotti, D. (2015). DeepRepresentations for iris,face and fingerprint spoofing detection. IEEE Transactions on Information Forensics and Security, 10(4), 864–879. https://doi.org/https://doi.org/10.1109/TIFS.2015.2398817
  • Nanni, L. A. (2017). Overview of the combination of biometric matchers. Inf. Fusion, 33, 71–85. https://doi.org/https://doi.org/10.1016/j.inffus.2016.05.003
  • Nguyen, D. T., Pham, T. D., Lee, Y. W., & Park, K. R. (2018). Deep learning-based enhanced presentation attack detection for iris recognition by combining features from local and global regions based on NIR camera sensor. Sensors (Basel), 18(8), 2601. https://doi.org/https://doi.org/10.3390/s18082601
  • NIST SRE Series. Multimodal Information Group. http://www.nist.gov/itl/iad/mig/sre.cfm. 2012.
  • Pagnin, E., & Mitrokotsa, A. (2017). Privacy-Preserving biometric authentication: challenges and directions. Security and Communication Networks, 1–9. https://doi.org/https://doi.org/10.1155/2017/7129505
  • Pandey, R. K., Zhou, Y., Kota, B. U., & Govindaraju, V. Deep secure encoding for face template protection. In 2016 IEEE conference on computer vision and pattern recognition workshops (CVPRW), Las Vegas, NV, 2016, pp. 77–83.
  • Parkhi, O. M., Vedaldi, A., & Zisserman, A. Deep face recognition. In Proceedings of the british machine vision conference(BMVC),2015,pp. 41.1–41.12. Swansea ,UK.
  • Peng, X., Ratha, N., & Pankanti, S. Learning face recognition from limited training data using deep neural networks. In Proceedings of the 23rd international conference on pattern recognition,2016, pp. 1442–1447. Cancun, Mexico.
  • Prabhakar, S., Pankanti, S., & Jain, A. (2003). Biometric recognition: Security and privacy concerns. IEEE Security & Privacy, 1(2), 33–42. https://doi.org/https://doi.org/10.1109/MSECP.2003.1193209
  • Radzi, R. (2016). F. User identification system based on finger-vein pattern using convolutional neural network. ARPN Journal of Engineering and Applied Sciences, 11(5). http://www.arpnjournals.org/jeas/research_papers/rp_2016/jeas_0316_3805.pdf
  • Raja, K. B., Raghavendra, R., Vemuri, V. K., & Busch, C. (2015). Smartphone based visible iris recognition using deep sparse filtering. Pattern Recognition Letters, 57(C), 33–42. https://doi.org/https://doi.org/10.1016/j.patrec.2014.09.007
  • Ramaiah, N. P., Ijjina, E. P., & Mohan, C. K. Illumination invariant face recognition using convolutional neural networks. In IEEE international conference on signal processing, informatics, communication and energy systems (SPICES), Kozhikode, 2015, pp. 1–4.
  • Ranjan, R., Sankaranarayanan, S., Castillo, C. D., & Chellppa, R. An all-in-one convolutional neural network for face analysis. In Proceedings of the IEEE 12th international conference on automatic face and gesture recognition (FG’17). 2017, pp. 17–24. Washington, DC, USA.
  • Ratha, N. K., Connell, J. H., & Bolle, R. M. An analysis of minutiae matching strength. In Proceedings of the 3rd international conference on audio-and video-based biometric person authentication, Sweden, 6–8 June 2001, pp. 223–228.
  • Rathgeb, C., & Busch, C. Improvement of iris recognition based on iris-code bit-error pattern analysis. In 2017 international conference of the biometrics special interest group (BIOSIG), Darmstadt, 2017, pp. 1–6.
  • Rathgeb, C., Uhl, A., & Peter, W. (2013). Iris biometrics. Springer, .
  • Ricanek, K., & Tesafaye, T. Morph: A longitudinal image database of normal adult age-progression. In Proceedings of the international conference on automatic face and gesture recognition (FGR’06). Southampton, UK: IEEE, 2006, pp. 341–345.
  • Roomi, M., Beham, M. P., & Dharmalakshmi, D. (2015). Face spoofing detection based on depthmap and gradient binary pattern. International Journal of Applied Engineering Research, 9(21), 4990–4996. https://www.researchgate.net/publication/274530129_Face_Spoofing_Detection_Based_on_Depthmap_and_Gradient_Binary_Pattern
  • Ross, A., Nandakumar, K., & Jain, A. K. (2006). Handbook of multibiometrics. J. Chem. Inf. Model, 53(9), 1689–1699. https://doi.org/https://doi.org/10.1007/0-387-33123-9
  • Sadhya, D., & Singh, S. (2018). Design of a cancelable biometric template protection scheme for fingerprints based on cryptographic hash functions. Multimedia Tools and Applications, 77(12), 15113–15137. https://doi.org/https://doi.org/10.1007/s11042-017-5095-x
  • Sahasrabudhe, S., & Namboodiri, A. M. Fingerprint enhancement using unsupervised hierarchical feature learning. In Proceedings of the 2014 indian conference on computer vision graphics and image processing. ACM, 2013.
  • Salakhutdinov, R., & Larochelle, H. Efficient learning of deep boltzmann machines. AISTATS,2010. Proceedings of Machine Learning Research, JMLR.
  • Saleem, M. M., & Hansen, J. H. L. A discriminative unsupervised method for speaker recognition using deep learning. In Proceedings of the IEEE 26th international workshop on machine learning for signal processing (MLSP’16). Vietri sul Mare, Italy: IEEE, 2016, pp.1–5.
  • Schroff, F., Kalenichenko, D., & Phibin:, J. FacenetA unified embedding for face recognition and clustering. In Proceedings of the IEEE conference on computer vision and pattern recognition, 2015, pp. 815–823. Boston, MA, USA.
  • Sequeira, A., Juliano, M., & Jaime, C. Iris liveness detection methods in mobile applications. In VISAPP 2014 - proceedings of the 9th international conference on computer vision theory and applications, 2014. Lisbon, Portugal.
  • Shah, S., & Ross, A. Generating synthetic irises by feature agglomeration. In Proc. of IEEE international conference on image processing (ICIP), Atlanta, USA, October 2006.
  • Shiranthika, C. Face spoof detection. Data driven investor,Medium. https://medium.com/datadriveninvestor/face-spoof-detection-e0d08fb246ea,2019.
  • Silva, P., Luz, E., Baeta, R., Pedrini, H., Falcao, A. X., & Menotti, D. An approach to iris contact lens detection based on deep image representation. In Proceedings of the IEEE conference on graphics, patterns and images, salvador, Brazil, 26–29 August 2015, pp. 157–164.
  • Sun, Y., Chen, Y., Wang, X., & Tang, X. (2014). Deep learning face representation by joint identification verification. Advances in Neural Information Processing Systems, 2, 1988–1996. https://doi.org/https://doi.org/10.5555/2969033.2969049
  • Sun, Y., Wang, X., & Tang, X. Sparsifying neural network connections for face recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition,2016, pp.4856–4864. Las Vegas, Nevada, United States.
  • Sundararajan, K., & Woodard, D. (2018). Deep learning for biometrics. ACM Computing Surveys, 51(3), 1–34. https://doi.org/https://doi.org/10.1145/3190618
  • Taigman, Y., Yang, M., Ranzato, M., & Wolf, L. Deepface: Closing the gap to human-level performance in face verification. In Proceedings of the IEEE conference on computer vision and pattern recognition, 2014, pp. 1701–1708. Columbus, OH, USA.
  • Tan, B., & Schuckers, S. Liveness detection for fingerprint scanners based on the statistics of wavelet signal processing. In 2006 conference on computer vision and pattern recognition workshop (CVPRW’06), New York, NY, USA, 2006, pp. 26–27.
  • Tan, T., He, Z., & Sun, Z. (2010). Efficient and robustsegmentation of noisy iris images for non-cooperative iris recognition. Image and Vision Computing, 28(2), 223–230. https://doi.org/https://doi.org/10.1016/j.imavis.2009.05.008
  • Tome, P., Vanoni, M., & Marcel, S. On the vulnerability of finger vein recognition to spoofing. In IEEE international conference of the biometrics special interest group (BIOSIG), Darmstadt, Germay,2014:1–10
  • Vasilakakis, V., Cumani, S., & Laface, P. SpeakerRecognition by means of deep belief networks. https://cls.ru.nl/staff/dvleeuwen/btfs-2013/vasilakakis-btfs2013.pdf
  • Wang, C., Zhang, X., & Lan, X. How to Train Triplet Networks with 100K Identities? arXiv:1709.02940v1 [cs.CV],2017.
  • Wang, Y., Wang, L., Cheung, Y., & Yuen, P. C. Fingerprint geometric hashing based on binary minutiae cylinder codes. In Proceedings of the 2014 22nd international conference on pattern recognition,2014, pp.690–695. Stockholm, Sweden.
  • Wang-Su, J., & Sang-Yong, R. (2017). Fingerprint pattern classification using convolution neural network. International Journal of Fuzzy Logic andIntelligent Systems, 17(1), 170–176. https://doi.org/https://doi.org/10.5391/IJFIS.2017.17.3.170
  • Wen, D., Han, H., & Jain, A. K. (2015). Face spoof detection with image distortion analysis. IEEE Transactions on Information Forensics and Security, 10(4), 746–761. https://doi.org/https://doi.org/10.1109/TIFS.2015.2400395
  • Wen, Y., Zhang, K., Li, Z., & Qiao, Y. A discriminative feature learning approach for deep face recognition. ECCV. 2016, Springer.
  • Xia, Z., Yuan, C., Sun, X., Sun, D., & Lv, R. (2019). Combining wavelet transform and LBP related features for fingerprint liveness detection. IAENG International Journal of Computer Science, 43(3), 290–298. http://www.iaeng.org/IJCS/issues_v43/issue_3/IJCS_43_3_04.pdf
  • Yang, W., Hu, J., Wang, S., & Wu, Q. (2018). Biometrics based privacy-preserving authentication and mobile template protection. Wireless Communications and Mobile Computing, 1–17. https://doi.org/https://doi.org/10.1155/2018/7107295
  • Yang, W., Wang, S., Hu, J., Zheng, G., & Valli, C. (2019). Security and accuracy of fingerprint-based biometrics: A review. Symmetry, 11(2), 141. https://doi.org/https://doi.org/10.3390/sym11020141
  • Yin, X., & Liu, X. (2018). Multi-task convolutional neural network for pose-invariant face recognition. IEEETransactions on Image Processing, 27(2), 964–975. https://doi.org/https://doi.org/10.1109/TIP.2017.2765830
  • Yuan, C., Xia, Z., & Jiang, L. (2019). Fingerprint liveness detection using an improved CNN with image scale equalization. IEEE Access, 7, 26953–26966. https://doi.org/https://doi.org/10.1109/ACCESS.2019.2901235
  • Zahid, A., & Foresti, G. L. (2016). Face spoof attack recognition using discriminative image patches. Journal of Electrical and Computer Engineering, 1, 14. https://doi.org/https://doi.org/10.1155/2016/4721849
  • Zeng, M., Nguyen, L., Yu, B., Mengshoel, O., Zhu, J., Wu, P., & Zhang, J. Convolutional neural networks for human activity recognition using mobile sensors. In 6th international conference mobile computing, applications and services, 2014, pp. 197–205. Austin, TX, USA.
  • Zhao, Z., & Kumar, A. (2017). Towards more accurate iris recognition using deeply learned spatially corresponding features.in ICCV
  • Zhou, K., Chellappa, R., Zhao, W (2006). Unconstrained Face recognition. International Series on Biometrics, Springer,5(1), 1–244.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.