The FERET Verification Testing Protocol for Face Recognition Algorithms
FG '98 Proceedings of the 3rd. International Conference on Face & Gesture Recognition
FVC2000: Fingerprint Verification Competition
IEEE Transactions on Pattern Analysis and Machine Intelligence
Statistical Richness of Visual Phase Information: Update on Recognizing Persons by Iris Patterns
International Journal of Computer Vision
Zero-interaction authentication
Proceedings of the 8th annual international conference on Mobile computing and networking
Usability and biometric verification at the ATM interface
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A Multi-View Facial Analysis Technique for Identity Authentication
IEEE Pervasive Computing
Creating an Electronic Commerce Device Which Promotes Universal Access: The KALI Project
DCW '00 Proceedings of the Third International Workshop on Distributed Communities on the Web
Biometric identification systems
Signal Processing
Error analysis of pattern recognition systems: the subsets bootstrap
Computer Vision and Image Understanding
DAVE: a system for quality driven adaptive video delivery
MIR '03 Proceedings of the 5th ACM SIGMM international workshop on Multimedia information retrieval
Parametrically controlled synthetic imagery experiment for face recognition testing
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Protecting applications with transient authentication
Proceedings of the 1st international conference on Mobile systems, applications and services
IEEE Transactions on Computers
IR and visible light face recognition
Computer Vision and Image Understanding
An adaptation framework for new media artworks
Proceedings of the 13th annual ACM international conference on Multimedia
Performance Evaluation of Fingerprint Verification Systems
IEEE Transactions on Pattern Analysis and Machine Intelligence
The case for transient authentication
EW 10 Proceedings of the 10th workshop on ACM SIGOPS European workshop
Protecting file systems with transient authentication
Wireless Networks
Mobile Device Security Using Transient Authentication
IEEE Transactions on Mobile Computing
Intraclass Retrieval of Nonrigid 3D Objects: Application to Face Recognition
IEEE Transactions on Pattern Analysis and Machine Intelligence
A study of identical twins' palmprints for personal verification
Pattern Recognition
Usability evaluation of multi-modal biometric verification systems
Interacting with Computers
IEEE Transactions on Pattern Analysis and Machine Intelligence
Illumination Invariant Face Recognition Using Near-Infrared Images
IEEE Transactions on Pattern Analysis and Machine Intelligence
Damascening video databases for evaluation of face tracking and recognition - The DXM2VTS database
Pattern Recognition Letters
Palmprint Verification for Controlling Access to Shared Computing Resources
IEEE Pervasive Computing
Performance characterization in computer vision: A guide to best practices
Computer Vision and Image Understanding
Formal security analysis of Australian e-passport implementation
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
An engineering approach to sociable robots
Journal of Experimental & Theoretical Artificial Intelligence
Evaluations of Automatic Speaker Classification Systems
Speaker Classification I
Natural Interaction with a Robotic Head
IWINAC '07 Proceedings of the 2nd international work-conference on The Interplay Between Natural and Artificial Computation, Part I: Bio-inspired Modeling of Cognitive Tasks
Requirements of federated trust management for service-oriented architectures
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Biometrics education with hands-on labs
Proceedings of the 46th Annual Southeast Regional Conference on XX
VideoTicket: detecting identity fraud attempts via audiovisual certificates and signatures
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
IR and visible light face recognition
Computer Vision and Image Understanding
Meta-analysis of third-party evaluations of iris recognition
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans - Special section: Best papers from the 2007 biometrics: Theory, applications, and systems (BTAS 07) conference
The BANCA database and evaluation protocol
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
Face verification competition on the XM2VTS database
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Comparing elastic alignment algorithms for the off-line signature verification problem
IWINAC'11 Proceedings of the 4th international conference on Interplay between natural and artificial computation: new challenges on bioinspired applications - Volume Part II
Pattern Recognition and Image Analysis
Highly accurate and fast face recognition using near infrared images
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Technology evaluations on the TH-FACE recognition system
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
A study of identical twins’ palmprints for personal authentication
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Recognising persons by their iris patterns
SINOBIOMETRICS'04 Proceedings of the 5th Chinese conference on Advances in Biometric Person Authentication
Continuous keystroke dynamics: A different perspective towards biometric evaluation
Information Security Tech. Report
Door access control using human face and height
EGMM'04 Proceedings of the Seventh Eurographics conference on Multimedia
Quantitative security evaluation of a multi-biometric authentication system
SAFECOMP'12 Proceedings of the 2012 international conference on Computer Safety, Reliability, and Security
Pattern Recognition and Image Analysis
Computational Intelligence and Neuroscience
Sliding Window Based Fast Corner Matching Palmprint Authentication
International Journal of Computer Vision and Image Processing
Fusion of iris and periocular biometrics for cross-sensor identification
CCBR'12 Proceedings of the 7th Chinese conference on Biometric Recognition
Hi-index | 4.10 |
On the basis of media hype alone, you might conclude that biometric passwords will soon replace their alphanumeric counterparts with versions that cannot be stolen, forgotten, lost, or given to another person. But what if the actual performance of these systems falls short of the estimates? The authors designed this article to provide sufficient information to know what questions to ask when evaluating a biometric system, and to assist in determining whether performance levels meet the requirements of an application. For example, a low-performance biometric is probably sufficient for reducing--as opposed to eliminating--fraud. Likewise, completely replacing an existing security system with a biometric- based one may require a high-performance biometric system, or the required performance may be beyond what current technology can provide. Of the biometrics that give the user some control over data acquisition, voice, face, and fingerprint systems have undergone the most study and testing--and therefore occupy the bulk of this discussion. This article also covers the tools and techniques of biometric testing.