CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
Cancelable Biometric Filters for Face Recognition
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 3 - Volume 03
Combining Crypto with Biometrics Effectively
IEEE Transactions on Computers
An improved BioHashing for human authentication
Pattern Recognition
Automatic 3D Face Reconstruction based on Single 2D Image
MUE '07 Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering
Generating Cancelable Fingerprint Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
Image-based 3D face modeling system
EURASIP Journal on Applied Signal Processing
Audiovisual speech synchrony measure: application to biometrics
EURASIP Journal on Applied Signal Processing
Analysis of 3D Face Reconstruction
ICIAP '07 Proceedings of the 14th International Conference on Image Analysis and Processing
Guide to Biometric Reference Systems and Performance Evaluation
Guide to Biometric Reference Systems and Performance Evaluation
Audio-Visual Identity Verification and Robustness to Imposture
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Talking-face identity verification, audiovisual forgery, and robustness issues
EURASIP Journal on Advances in Signal Processing - Special issue on recent advances in biometric systems: a signal processing perspective
Multi-biometrics based cryptographic key regeneration scheme
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Audio-visual identity verification: an introductory overview
Progress in nonlinear speech processing
ACCV'06 Proceedings of the 7th Asian conference on Computer Vision - Volume Part II
Fingerprint-Based Fuzzy Vault: Implementation and Performance
IEEE Transactions on Information Forensics and Security
Hi-index | 0.01 |
The preservation of your identity could become a major concern. In many situations, you need to claim an identity and this claim needs to be verified somehow. The technology called biometrics may help. But, what if a deliberate impostor claims your identity? Will this forgery be always detected? Biometric identity verification is imperfect. This paper reviews some of the techniques that a deliberate impostor could use to defeat a biometric verification system. It focuses on audio-visual forgeries using voice conversion and face animation. It also describes identity disguise as a means of falsifying and concealing one|s identity. The recovery of an identity and cancellable biometrics are also useful techniques to protect from identity theft. Such techniques could also find useful applications in multimedia.