Showing results 21 - 30 of 32
-
UNDERSTANDING BIOMETRICS – CONSIDERATIONS FOR IMPLEMENTING A BIOMETRIC SYSTEM
The Biometrics Institute has produced a resource for members who are new to biometrics and those...
May 10 -
5 WAYS TO REDUCE THE RISK OF CYBER FRAUD AND PREVENT SOCIAL ENGINEERING
Author: Khalil Dimachkie, Smile Pass The definition for social engineering is the psychological...
Feb 22 -
FRAUDULENT ID USING FACE MORPHS: EXPERIMENTS ON HUMAN AND AUTOMATIC RECOGNITION
David J. Robertson, Robin S. S. Kramer, A. Mike BurtonĀ Published: March 22, 2017 Matching...
Nov 23 -
A NEW FACIAL DATABASE FOR AUSTRALIA?
We are seeing a lot of discussion around the latest government announcements for the creation of a...
Oct 7 -
IMPROVING PRESENTATION ATTACK DETECTION IN DYNAMIC HANDWRITTEN SIGNATURE BIOMETRICS
Handwritten Signature Recognition is a biometric mode that has started to be deployed. Therefore,...
Sep 26 -
VIEWPOINT: SPOOF OR PROOF
SPOOFING FOCUS Read the latest thought-leadership piece "Spoof or Proof" dealing with the issue of...
Sep 7 -
BIOMETRICS INSTITUTE FACE VULNERABILITY LITERATURE REVIEW
The Biometrics Institute conducted a literature review on face vulnerabilities in 2007 as part of...
Jun 30 -
ERROR RATES IN USERS OF FACE RECOGNITION SOFTWARE
This article has been accepted for publication in PLOS ONE and will be published in the next month...
Sep 29 -
Top 10 Vulnerability Questions
The Top 10 Vulnerability Questions guiding document addresses questions like whether a biometric...
Sep 9 -
A SURVEY ON ANTI-SPOOFING SCHEMES FOR FINGERPRINT RECOGNITION SYSTEMS
Emanuela Marasco, West Virginia University & Arun Ross, Michigan State University ACM Comput....
Jan 1


