2014
DOI: 10.1016/j.imavis.2013.10.001
|View full text |Cite
|
Sign up to set email alerts
|

Bi-modal biometric authentication on mobile phones in challenging conditions

Abstract: This paper examines the issue of face, speaker and bi-modal authentication in mobile environments when there is significant condition mismatch. We introduce this mismatch by enrolling client models on high quality biometric samples obtained on a laptop computer and authenticating them on lower quality biometric samples acquired with a mobile phone. To perform these experiments we develop three novel authentication protocols for the large publicly available MOBIO database. We evaluate state-of-the-art face, spe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 31 publications
(25 citation statements)
references
References 36 publications
0
24
0
Order By: Relevance
“…Physiological biometric techniques are based on biological measurements and inherent characteristics that a person owns such as face, iris, teeth, voice, fingerprint, hand geometry, and heart rate [2,[6][7][8]. Behavioral biometric techniques are related to something that a person is able to perform and repeat in a unique manner, such as handwriting signature, gait, and keystroke dynamics [4,7,9,10].…”
Section: Biometric Authenticationmentioning
confidence: 99%
“…Physiological biometric techniques are based on biological measurements and inherent characteristics that a person owns such as face, iris, teeth, voice, fingerprint, hand geometry, and heart rate [2,[6][7][8]. Behavioral biometric techniques are related to something that a person is able to perform and repeat in a unique manner, such as handwriting signature, gait, and keystroke dynamics [4,7,9,10].…”
Section: Biometric Authenticationmentioning
confidence: 99%
“…We believe that multi-modal frameworks are more likely to provide meaningful security guarantees. A combination of face recognition and speech [17], and of gait and voice [32] have been proposed in this context. Deep learning techniques, which achieved early success modeling sequential data such as motion capture [31] and video [16] have shown promise in multi-modal feature learning [22], [30], [15], [21].…”
Section: Related Workmentioning
confidence: 99%
“…ISV and Graphs require resolutions that are a bit higher, but also these algorithms settle around 100 pixels image height. Since there is not much difference between the resolutions greater than 32 × 40 pixels, we choose to stick at the resolution 64 × 80 as used in many of our previous publications [14,23,68,73] for the rest of our experiments.…”
Section: Configuration Optimizationmentioning
confidence: 99%