{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T20:06:56Z","timestamp":1747339616050,"version":"3.40.3"},"publisher-location":"Cham","reference-count":104,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030987947"},{"type":"electronic","value":"9783030987954"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-98795-4_8","type":"book-chapter","created":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T18:03:58Z","timestamp":1649354638000},"page":"156-180","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["AI for\u00a0Biometric Authentication Systems"],"prefix":"10.1007","author":[{"given":"Tim Van","family":"hamme","sequence":"first","affiliation":[]},{"given":"Giuseppe","family":"Garofalo","sequence":"additional","affiliation":[]},{"given":"Sander","family":"Joos","sequence":"additional","affiliation":[]},{"given":"Davy","family":"Preuveneers","sequence":"additional","affiliation":[]},{"given":"Wouter","family":"Joosen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,8]]},"reference":[{"key":"8_CR1","unstructured":"Livdet. https:\/\/livdet.org. Accessed 11 June 2020"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Adler, A.: Images can be regenerated from quantized biometric match score data. In: Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No. 04CH37513), vol. 1, pp. 469\u2013472. IEEE (2004)","DOI":"10.1109\/CCECE.2004.1345057"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Biggio, B., Didaci, L., Fumera, G., Roli, F.: Poisoning attacks to compromise face templates. In: 2013 International Conference on Biometrics (ICB), pp. 1\u20137. IEEE (2013)","DOI":"10.1109\/ICB.2013.6613006"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/978-3-642-34166-3_46","volume-title":"Structural, Syntactic, and Statistical Pattern Recognition","author":"B Biggio","year":"2012","unstructured":"Biggio, B., Fumera, G., Roli, F., Didaci, L.: Poisoning adaptive biometric systems. In: Gimel\u2019farb, G., et al. (eds.) SSPR \/SPR 2012. LNCS, vol. 7626, pp. 417\u2013425. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34166-3_46"},{"issue":"5","key":"8_CR5","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/MSP.2015.2426728","volume":"32","author":"B Biggio","year":"2015","unstructured":"Biggio, B., Russu, P., Didaci, L., Roli, F., et al.: Adversarial biometric recognition: a review on biometric system security from the adversarial machine-learning perspective. IEEE Signal Process. Mag. 32(5), 31\u201341 (2015)","journal-title":"IEEE Signal Process. Mag."},{"issue":"9","key":"8_CR6","doi-asserted-by":"publisher","first-page":"1433","DOI":"10.1109\/TIFS.2013.2272786","volume":"8","author":"M Blanton","year":"2013","unstructured":"Blanton, M., Aliasgari, M.: Analysis of reusability of secure sketches and fuzzy extractors. IEEE Trans. Inf. Forensics Secur. 8(9), 1433\u20131445 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"8_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2968215","volume":"49","author":"J Blasco","year":"2016","unstructured":"Blasco, J., Chen, T.M., Tapiador, J., Peris-Lopez, P.: A survey of wearable biometric recognition systems. ACM Comput. Surv. 49(3), 1\u201335 (2016). https:\/\/doi.org\/10.1145\/2968215","journal-title":"ACM Comput. Surv."},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Herley, C., v. Oorschot, P.C., Stajano, F.: The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: 2012 IEEE Symposium on Security and Privacy, pp. 553\u2013567 (2012)","DOI":"10.1109\/SP.2012.44"},{"key":"8_CR9","unstructured":"Buolamwini, J., Gebru, T.: Gender shades: intersectional accuracy disparities in commercial gender classification. In: Conference on Fairness, Accountability and Transparency, pp. 77\u201391 (2018)"},{"key":"8_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-5230-9","volume-title":"Security and Privacy in Biometrics","author":"P Campisi","year":"2013","unstructured":"Campisi, P.: Security and Privacy in Biometrics, vol. 24. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-1-4471-5230-9"},{"key":"8_CR11","unstructured":"Cao, K., Jain, A.K.: Hacking mobile phones using 2D printed fingerprints. Michigan State University, Department of Computer Science and Engineering (2016)"},{"issue":"2","key":"8_CR12","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s11263-013-0667-3","volume":"107","author":"X Cao","year":"2014","unstructured":"Cao, X., Wei, Y., Wen, F., Sun, J.: Face alignment by explicit shape regression. Int. J. Comput. Vision 107(2), 177\u2013190 (2014). https:\/\/doi.org\/10.1007\/s11263-013-0667-3","journal-title":"Int. J. Comput. Vision"},{"issue":"11","key":"8_CR13","doi-asserted-by":"publisher","first-page":"2629","DOI":"10.1109\/TCSI.2015.2476318","volume":"62","author":"Y Cao","year":"2015","unstructured":"Cao, Y., Zhang, L., Zalivaka, S.S., Chang, C., Chen, S.: CMOS image sensor based physical unclonable function for coherent sensor-level authentication. IEEE Trans. Circuits Syst. I Regul. Pap. 62(11), 2629\u20132640 (2015)","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Chen, S., Pande, A., Mohapatra, P.: Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones. In: Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, pp. 109\u2013122 (2014)","DOI":"10.1145\/2594368.2594373"},{"key":"8_CR15","unstructured":"Chou, E., Tram\u00e8r, F., Pellegrino, G., Boneh, D.: SentiNet: detecting physical attacks against deep learning systems. arXiv preprint arXiv:1812.00292 (2018)"},{"issue":"1","key":"8_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13635-020-0101-7","volume":"2020","author":"D Cozzolino","year":"2020","unstructured":"Cozzolino, D., Marra, F., Gragnaniello, D., Poggi, G., Verdoliva, L.: Combining PRNU and noiseprint for robust and efficient device source identification. EURASIP J. Inf. Secur. 2020(1), 1\u201312 (2020). https:\/\/doi.org\/10.1186\/s13635-020-0101-7","journal-title":"EURASIP J. Inf. Secur."},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/TIFS.2019.2916364","volume":"15","author":"D Cozzolino","year":"2019","unstructured":"Cozzolino, D., Verdoliva, L.: Noiseprint: a CNN-based camera model fingerprint. IEEE Trans. Inf. Forensics Secur. 15, 144\u2013159 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"8_CR18","first-page":"441","volume":"11","author":"A Dantcheva","year":"2016","unstructured":"Dantcheva, A., Elia, P., Ross, A.: What else does your biometric data reveal? Survey Soft Biometrics 11(3), 441\u2013467 (2016)","journal-title":"Survey Soft Biometrics"},{"key":"8_CR19","doi-asserted-by":"publisher","unstructured":"Darlow, L.N., Rosman, B.: Fingerprint minutiae extraction using deep learning. In: IEEE International Joint Conference on Biometrics, IJCB 2017, 22\u201330 January 2018 (2018). https:\/\/doi.org\/10.1109\/BTAS.2017.8272678","DOI":"10.1109\/BTAS.2017.8272678"},{"issue":"4","key":"8_CR20","doi-asserted-by":"publisher","first-page":"788","DOI":"10.1109\/TASL.2010.2064307","volume":"19","author":"N Dehak","year":"2011","unstructured":"Dehak, N., Kenny, P.J., Dehak, R., Dumouchel, P., Ouellet, P.: Front-end factor analysis for speaker verification. IEEE Trans. Audio Speech Lang. Process. 19(4), 788\u2013798 (2011)","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., Zafeiriou, S.: ArcFace: additive angular margin loss for deep face recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4690\u20134699 (2019)","DOI":"10.1109\/CVPR.2019.00482"},{"key":"8_CR22","doi-asserted-by":"publisher","unstructured":"Derawi, M.O., Bours, P., Holien, K.: Improved cycle detection for accelerometer based gait authentication. In: 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 312\u2013317 (2010). https:\/\/doi.org\/10.1109\/IIHMSP.2010.84","DOI":"10.1109\/IIHMSP.2010.84"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Eberz, S., Lovisotto, G., Patan\u00e8, A., Kwiatkowska, M., Lenders, V., Martinovic, I.: When your fitness tracker betrays you: quantifying the predictability of biometric features across contexts. In: 2018 IEEE Symposium on Security and Privacy (SP)m, pp. 889\u2013905 (2018)","DOI":"10.1109\/SP.2018.00053"},{"key":"8_CR24","doi-asserted-by":"publisher","unstructured":"Eberz, S., Lovisotto, G., Rasmussen, K.B., Lenders, V., Martinovic, I.: 28 blinks later: tackling practical challenges of eye movement biometrics. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201919, pp. 1187\u20131199. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3319535.3354233","DOI":"10.1145\/3319535.3354233"},{"issue":"18","key":"8_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s19184054","volume":"19","author":"P Fernandez-Lopez","year":"2019","unstructured":"Fernandez-Lopez, P., Liu-Jimenez, J., Kiyokawa, K., Wu, Y., Sanchez-Reillo, R.: Recurrent neural network for inertial gait user recognition in smartphones. Sensors (Switzerland) 19(18), 1\u201316 (2019). https:\/\/doi.org\/10.3390\/s19184054","journal-title":"Sensors (Switzerland)"},{"key":"8_CR26","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.compeleceng.2014.10.018","volume":"41","author":"L Fridman","year":"2015","unstructured":"Fridman, L., et al.: Multi-modal decision fusion for continuous authentication. Comput. Electr. Eng. 41, 142\u2013156 (2015)","journal-title":"Comput. Electr. Eng."},{"key":"8_CR27","doi-asserted-by":"publisher","unstructured":"Gadaleta, M., Rossi, M.: IDNet: smartphone-based gait recognition with convolutional neural networks. Pattern Recognit. 74, 25\u201337 (2018). https:\/\/doi.org\/10.1016\/j.patcog.2017.09.005. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0031320317303485","DOI":"10.1016\/j.patcog.2017.09.005"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Gafurov, D., Snekkenes, E., Bours, P.: Improved gait recognition performance using cycle matching. In: 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2010, pp. 836\u2013841 (01 2010)","DOI":"10.1109\/WAINA.2010.145"},{"key":"8_CR29","unstructured":"Garofalo, G., Rimmer, V., Preuveneers, D., Joosen, W., et al.: Fishy faces: crafting adversarial images to poison face authentication. In: 12th $$\\{$$USENIX$$\\}$$ Workshop on Offensive Technologies ($$\\{$$WOOT$$\\}$$ 18) (2018)"},{"key":"8_CR30","unstructured":"Gilchrist, G., Viavant, S.D.: Trusted biometric client authentication (2000). uS Patent 6,167,517"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Gomez-Barrero, M., Galbally, J.: Reversing the irreversible: a survey on inverse biometrics. Comput. Secur. 90, 101700 (2020)","DOI":"10.1016\/j.cose.2019.101700"},{"issue":"6","key":"8_CR32","doi-asserted-by":"publisher","first-page":"1406","DOI":"10.1109\/TIFS.2017.2788000","volume":"13","author":"M Gomez-Barrero","year":"2017","unstructured":"Gomez-Barrero, M., Galbally, J., Rathgeb, C., Busch, C.: General framework to evaluate unlinkability in biometric template protection systems. IEEE Trans. Inf. Forensics Secur. 13(6), 1406\u20131420 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR33","unstructured":"Greene, J.: Microsoft won\u2019t sell police its facial-recognition technology, following similar moves by Amazon and IBM. https:\/\/www.washingtonpost.com\/technology\/2020\/06\/11\/microsoft-facial-recognition\/. Accessed 15 June 2020"},{"issue":"8","key":"8_CR34","doi-asserted-by":"publisher","first-page":"2153","DOI":"10.1109\/TIFS.2019.2894031","volume":"14","author":"LG Hafemann","year":"2019","unstructured":"Hafemann, L.G., Sabourin, R., Oliveira, L.S.: Characterizing and evaluating adversarial examples for offline handwritten signature verification. IEEE Trans. Inf. Forensics Secur. 14(8), 2153\u20132166 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR35","unstructured":"Hamilton, I.A.: Outrage over police brutality has finally convinced Amazon, Microsoft, and IBM to rule out selling facial recognition tech to law enforcement. Here\u2019s what\u2019s going on. https:\/\/www.businessinsider.com\/amazon-microsoft-ibm-halt-selling-facial-recognition-to-police-2020-6?r=US&IR=T. Accessed 15 June 2020"},{"key":"8_CR36","unstructured":"Hunt, T.: haveibeenpwnd. https:\/\/haveibeenpwned.com\/. Accessed 15 June 2020"},{"key":"8_CR37","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/TBIOM.2020.2992274","volume":"2","author":"N Karimian","year":"2020","unstructured":"Karimian, N., Woodard, D., Forte, D.: ECG biometric: spoofing and countermeasures. IEEE Trans. Biometrics Behav. Identity Sci. 2, 257\u2013270 (2020)","journal-title":"IEEE Trans. Biometrics Behav. Identity Sci."},{"key":"8_CR38","unstructured":"Komkov, S., Petiushko, A.: AdvHat: real-world adversarial attack on ArcFace face id system. arXiv preprint arXiv:1908.08705 (2019)"},{"key":"8_CR39","doi-asserted-by":"crossref","unstructured":"Kreuk, F., Adi, Y., Cisse, M., Keshet, J.: Fooling end-to-end speaker verification with adversarial examples. In: 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1962\u20131966 (2018)","DOI":"10.1109\/ICASSP.2018.8462693"},{"key":"8_CR40","doi-asserted-by":"publisher","first-page":"2641","DOI":"10.1109\/TIFS.2020.2971144","volume":"15","author":"RS Kuzu","year":"2020","unstructured":"Kuzu, R.S., Piciucco, E., Maiorana, E., Campisi, P.: On-the-fly finger-vein-based biometric recognition using deep neural networks. IEEE Trans. Inf. Forensics Secur. 15, 2641\u20132654 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR41","doi-asserted-by":"publisher","unstructured":"Li, J., Fawaz, K., Kim, Y.: Velody: nonlinear vibration challenge-response for resilient user authentication. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201919, pp. 1201\u20131213. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3319535.3354242","DOI":"10.1145\/3319535.3354242"},{"key":"8_CR42","doi-asserted-by":"crossref","unstructured":"Li, Y., Li, Y., Yan, Q., Kong, H., Deng, R.H.: Seeing your face is not enough: an inertial sensor-based liveness detection for face authentication. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1558\u20131569 (2015)","DOI":"10.1145\/2810103.2813612"},{"key":"8_CR43","doi-asserted-by":"crossref","unstructured":"Lovisotto, G., Eberz, S., Martinovic, I.: Biometric backdoors: a poisoning attack against unsupervised template updating (2019)","DOI":"10.1109\/EuroSP48549.2020.00020"},{"key":"8_CR44","doi-asserted-by":"publisher","unstructured":"Lu, H., Huang, J., Saha, T., Nachman, L.: Unobtrusive gait verification for mobile phones. In: Proceedings of the 2014 ACM International Symposium on Wearable Computers, ISWC \u201914, pp. 91\u201398. ACM, New York (2014). https:\/\/doi.org\/10.1145\/2634317.2642868","DOI":"10.1145\/2634317.2642868"},{"key":"8_CR45","doi-asserted-by":"crossref","unstructured":"Luo, S., Nguyen, A., Song, C., Lin, F., Xu, W., Yan, Z.: OcuLock: exploring human visual system for authentication in virtual reality head-mounted display. In: Proceedings 2020 Network and Distributed System Security Symposium. Internet Society (2020)","DOI":"10.14722\/ndss.2020.24079"},{"key":"8_CR46","doi-asserted-by":"publisher","unstructured":"Mantyjarvi, J., Lindholm, M., Vildjiounaite, E., Makela, S.M., Ailisto, H.A.: Identifying users of portable devices from gait pattern with accelerometers. In: Proceedings, (ICASSP \u201905). IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 2, pp. ii\/973-ii\/976 (2005). https:\/\/doi.org\/10.1109\/ICASSP.2005.1415569","DOI":"10.1109\/ICASSP.2005.1415569"},{"issue":"9","key":"8_CR47","doi-asserted-by":"publisher","first-page":"2197","DOI":"10.1109\/TIFS.2017.2701335","volume":"12","author":"F Marra","year":"2017","unstructured":"Marra, F., Poggi, G., Sansone, C., Verdoliva, L.: Blind PRNU-based image clustering for source identification. IEEE Trans. Inf. Forensics Secur. 12(9), 2197\u20132211 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR48","doi-asserted-by":"crossref","unstructured":"Matovu, R., Serwadda, A.: Your substance abuse disorder is an open secret! gleaning sensitive personal information from templates in an EEG-based authentication system. In: 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1\u20137 (2016)","DOI":"10.1109\/BTAS.2016.7791210"},{"key":"8_CR49","doi-asserted-by":"crossref","unstructured":"Mura, V., et al.: LivDet 2017 fingerprint liveness detection competition 2017. In: 2018 International Conference on Biometrics (ICB), pp. 297\u2013302. IEEE (2018)","DOI":"10.1109\/ICB2018.2018.00052"},{"issue":"4","key":"8_CR50","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1109\/TPAMI.2008.106","volume":"31","author":"E Murphy-Chutorian","year":"2008","unstructured":"Murphy-Chutorian, E., Trivedi, M.M.: Head pose estimation in computer vision: a survey. IEEE Trans. Pattern Anal. Mach. Intell. 31(4), 607\u2013626 (2008)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"5","key":"8_CR51","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MSP.2015.2427849","volume":"32","author":"K Nandakumar","year":"2015","unstructured":"Nandakumar, K., Jain, A.K.: Biometric template protection: bridging the performance gap between theory and practice. IEEE Signal Process. Mag. 32(5), 88\u2013100 (2015)","journal-title":"IEEE Signal Process. Mag."},{"key":"8_CR52","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1016\/j.csl.2019.06.001","volume":"58","author":"A Nautsch","year":"2019","unstructured":"Nautsch, A., et al.: Preserving privacy in speaker and speech characterisation. Comput. Speech Lang. 58, 441\u2013480 (2019)","journal-title":"Comput. Speech Lang."},{"key":"8_CR53","doi-asserted-by":"publisher","unstructured":"Nguyen, D.L., Cao, K., Jain, A.K.: Robust minutiae extractor: integrating deep networks and fingerprint domain knowledge. In: Proceedings - 2018 International Conference on Biometrics, ICB 2018, pp. 9\u201316 (2018). https:\/\/doi.org\/10.1109\/ICB2018.2018.00013","DOI":"10.1109\/ICB2018.2018.00013"},{"key":"8_CR54","doi-asserted-by":"publisher","unstructured":"Nickel, C., Busch, C., Rangarajan, S., M\u00c3bius, M.: Using hidden Markov models for accelerometer-based biometric gait recognition. In: 2011 IEEE 7th International Colloquium on Signal Processing and its Applications, pp. 58\u201363 (2011). https:\/\/doi.org\/10.1109\/CSPA.2011.5759842","DOI":"10.1109\/CSPA.2011.5759842"},{"key":"8_CR55","unstructured":"NIST: Face recognition vendor test (FRVT). https:\/\/www.nist.gov\/programs-projects\/face-recognition-vendor-test-frvt-ongoing. Accessed 15 June 2020"},{"issue":"6","key":"8_CR56","doi-asserted-by":"publisher","first-page":"1206","DOI":"10.1109\/TIFS.2016.2520880","volume":"11","author":"RF Nogueira","year":"2016","unstructured":"Nogueira, R.F., de Alencar Lotufo, R., Campos Machado, R.: Fingerprint liveness detection using convolutional neural networks. IEEE Trans. Inf. Forensics Secur. 11(6), 1206\u20131213 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR57","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-319-13039-2_16","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2014","author":"E Pagnin","year":"2014","unstructured":"Pagnin, E., Dimitrakakis, C., Abidin, A., Mitrokotsa, A.: On the leakage of information in biometric authentication. In: Meier, W., Mukhopadhyay, D. (eds.) INDOCRYPT 2014. LNCS, vol. 8885, pp. 265\u2013280. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-13039-2_16"},{"key":"8_CR58","doi-asserted-by":"crossref","unstructured":"Pagnin, E., Mitrokotsa, A.: Privacy-preserving biometric authentication: challenges and directions. Security and Communication Networks 2017 (2017)","DOI":"10.1155\/2017\/7129505"},{"key":"8_CR59","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/978-3-319-46654-5_67","volume-title":"Biometric Recognition","author":"K Patel","year":"2016","unstructured":"Patel, K., Han, H., Jain, A.K.: Cross-database face antispoofing with robust feature representation. In: You, Z., et al. (eds.) CCBR 2016. LNCS, vol. 9967, pp. 611\u2013619. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46654-5_67"},{"key":"8_CR60","doi-asserted-by":"publisher","unstructured":"Peralta, D., et al.: A survey on fingerprint minutiae-based local matching for verification and identification: taxonomy and experimental evaluation. Inf. Sci. 315, 67 \u2013 87 (2015). https:\/\/doi.org\/10.1016\/j.ins.2015.04.013. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0020025515002819","DOI":"10.1016\/j.ins.2015.04.013"},{"key":"8_CR61","unstructured":"Peters, J.: IBM will no longer offer, develop, or research facial recognition technology. https:\/\/www.theverge.com\/2020\/6\/8\/21284683\/ibm-no-longer-general-purpose-facial-recognition-analysis-software. Accessed 15 June 2020"},{"issue":"7","key":"8_CR62","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S0969-4765(17)30138-8","volume":"2017","author":"P Punithavathi","year":"2017","unstructured":"Punithavathi, P., Subbiah, G.: Can cancellable biometrics preserve privacy? Biometric Technol. Today 2017(7), 8\u201311 (2017)","journal-title":"Biometric Technol. Today"},{"key":"8_CR63","series-title":"Advances in Computer Vision and Pattern Recognition","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-319-92627-8_2","volume-title":"Handbook of Biometric Anti-Spoofing","author":"KB Raja","year":"2019","unstructured":"Raja, K.B., Raghavendra, R., Venkatesh, S., Gomez-Barrero, M., Rathgeb, C., Busch, C.: A study of hand-crafted and naturally learned features for fingerprint presentation attack detection. In: Marcel, S., Nixon, M.S., Fierrez, J., Evans, N. (eds.) Handbook of Biometric Anti-Spoofing. ACVPR, pp. 33\u201348. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-319-92627-8_2"},{"issue":"5","key":"8_CR64","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MSP.2013.2261691","volume":"30","author":"S Rane","year":"2013","unstructured":"Rane, S., Wang, Y., Draper, S.C., Ishwar, P.: Secure biometrics: concepts, authentication architectures, and challenges. IEEE Signal Process. Mag. 30(5), 51\u201364 (2013). https:\/\/doi.org\/10.1109\/MSP.2013.2261691","journal-title":"IEEE Signal Process. Mag."},{"key":"8_CR65","doi-asserted-by":"crossref","unstructured":"Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614\u2013634 (2001). https:\/\/search.proquest.com\/docview\/222418906?accountid=17215. copyright - Copyright International Business Machines Corporation 2001; Last updated - 2012\u201302-17; CODEN - IBMSA7; SubjectsTermNotLitGenreText - United States; US","DOI":"10.1147\/sj.403.0614"},{"issue":"4","key":"8_CR66","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1049\/iet-bmt.2013.0049","volume":"3","author":"C Rathgeb","year":"2014","unstructured":"Rathgeb, C., Breitinger, F., Busch, C., Baier, H.: On application of bloom filters to iris biometrics. IET Biometrics 3(4), 207\u2013218 (2014)","journal-title":"IET Biometrics"},{"key":"8_CR67","doi-asserted-by":"crossref","unstructured":"Rathgeb, C., Gomez-Barrero, M., Busch, C., Galbally, J., Fierrez, J.: Towards cancelable multi-biometrics based on bloom filters: a case study on feature level fusion of face and iris. In: 3rd International Workshop on Biometrics and Forensics (IWBF 2015), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/IWBF.2015.7110225"},{"issue":"1","key":"8_CR68","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1186\/1687-417X-2011-3","volume":"2011","author":"C Rathgeb","year":"2011","unstructured":"Rathgeb, C., Uhl, A.: A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. Inf. Secur. 2011(1), 3 (2011)","journal-title":"EURASIP J. Inf. Secur."},{"key":"8_CR69","doi-asserted-by":"publisher","unstructured":"Rong, L., Jianzhong, Z., Ming, L., Xiangfeng, H.: A wearable acceleration sensor system for gait recognition. In: 2007 2nd IEEE Conference on Industrial Electronics and Applications, pp. 2654\u20132659 (2007). https:\/\/doi.org\/10.1109\/ICIEA.2007.4318894","DOI":"10.1109\/ICIEA.2007.4318894"},{"key":"8_CR70","doi-asserted-by":"crossref","unstructured":"Ross, A., et al.: Some research problems in biometrics: the future beckons. In: Proceedings of 12th IAPR International Conference on Biometrics (ICB) (2019)","DOI":"10.1109\/ICB45273.2019.8987307"},{"key":"8_CR71","doi-asserted-by":"publisher","unstructured":"Rozsa, A., G\u00fcnther, M., Rudd, E.M., Boult, T.E.: Facial attributes: accuracy and adversarial robustness. Pattern Recognit. Lett. 124, 100\u2013108 (2019). https:\/\/doi.org\/10.1016\/j.patrec.2017.10.024. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167865517303926. Award Winning Papers from the 23rd International Conference on Pattern Recognition (ICPR)","DOI":"10.1016\/j.patrec.2017.10.024"},{"issue":"1","key":"8_CR72","first-page":"269","volume":"7","author":"EA R\u00faa","year":"2012","unstructured":"R\u00faa, E.A., Maiorana, E., Luis, J., Castro, A., Campisi, P., Member, S.: Biometric template protection using universal background models: an application to online. Signature 7(1), 269\u2013282 (2012)","journal-title":"Signature"},{"key":"8_CR73","doi-asserted-by":"crossref","unstructured":"Sankaran, A., Pandey, P., Vatsa, M., Singh, R.: On latent fingerprint minutiae extraction using stacked denoising sparse autoencoders. In: IEEE International Joint Conference on Biometrics, pp. 1\u20137 (2014)","DOI":"10.1109\/BTAS.2014.6996300"},{"key":"8_CR74","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., Philbin, J.: FaceNet: a unified embedding for face recognition and clustering. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 815\u2013823 (2015)","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"8_CR75","doi-asserted-by":"crossref","unstructured":"Schuch, P., May, J.M., Busch, C.: Unsupervised learning of fingerprint rotations. In: 2018 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1\u20136 (2018)","DOI":"10.23919\/BIOSIG.2018.8553096"},{"key":"8_CR76","doi-asserted-by":"publisher","unstructured":"Schuckers, S.: Presentations and attacks, and spoofs, oh my. Image Vision Comput. 55, 26\u201330 (2016). https:\/\/doi.org\/10.1016\/j.imavis.2016.03.016. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S026288561630052X. Recognizing future hot topics and hard problems in biometrics research","DOI":"10.1016\/j.imavis.2016.03.016"},{"key":"8_CR77","doi-asserted-by":"crossref","unstructured":"Sharif, M., Bhagavatula, S., Bauer, L., Reiter, M.K.: Accessorize to a crime: real and stealthy attacks on state-of-the-art face recognition. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1528\u20131540 (2016)","DOI":"10.1145\/2976749.2978392"},{"issue":"4","key":"8_CR78","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1109\/TIFS.2015.2398819","volume":"10","author":"DF Smith","year":"2015","unstructured":"Smith, D.F., Wiliem, A., Lovell, B.C.: Face recognition on consumer devices: reflections on replay attacks. IEEE Trans. Inf. Forensics Secur. 10(4), 736\u2013745 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR79","doi-asserted-by":"crossref","unstructured":"Solano, J., Tengana, L., Castelblanco, A., Rivera, E., Lopez, C.E., Ochoa, M.: A few-shot practical behavioral biometrics model for login authentication in web applications (2020)","DOI":"10.14722\/madweb.2020.23011"},{"key":"8_CR80","doi-asserted-by":"crossref","unstructured":"Spooren, J., Preuveneers, D., Joosen, W.: PPG2Live: Using dual PPG for active authentication and liveness detection. In: Proceedings of the 12th IAPR International Conference on Biometrics (ICB 2019). IEEE (2019)","DOI":"10.1109\/ICB45273.2019.8987330"},{"key":"8_CR81","unstructured":"Tang, D., Zhou, Z., Zhang, Y., Zhang, K.: Face flashing: a secure liveness detection protocol based on light reflections. In: 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, 18\u201321 February 2018. The Internet Society (2018). http:\/\/wp.internetsociety.org\/ndss\/wp-content\/uploads\/sites\/25\/2018\/02\/ndss2018_03B-5_Tang_paper.pdf"},{"key":"8_CR82","doi-asserted-by":"publisher","unstructured":"Tang, Y., Gao, F., Feng, J., Liu, Y.: FingerNet: an unified deep network for fingerprint minutiae extraction. IEEE International Joint Conference on Biometrics, IJCB 2017 2018-January, pp. 108\u2013116 (2018). https:\/\/doi.org\/10.1109\/BTAS.2017.8272688","DOI":"10.1109\/BTAS.2017.8272688"},{"issue":"6","key":"8_CR83","doi-asserted-by":"publisher","first-page":"2034","DOI":"10.1016\/j.patcog.2007.12.002","volume":"41","author":"AB Teoh","year":"2008","unstructured":"Teoh, A.B., Kuan, Y.W., Lee, S.: Cancellable biometrics and annotations on BioHash. Pattern Recogn. 41(6), 2034\u20132044 (2008)","journal-title":"Pattern Recogn."},{"key":"8_CR84","doi-asserted-by":"crossref","unstructured":"Torres, W.A.A., Bhattacharjee, N., Srinivasan, B.: Effectiveness of fully homomorphic encryption to preserve the privacy of biometric data. In: Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, pp. 152\u2013158 (2014)","DOI":"10.1145\/2684200.2684296"},{"key":"8_CR85","doi-asserted-by":"crossref","unstructured":"Tran, L., Yin, X., Liu, X.: Disentangled representation learning GAN for pose-invariant face recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1415\u20131424 (2017)","DOI":"10.1109\/CVPR.2017.141"},{"issue":"8","key":"8_CR86","doi-asserted-by":"publisher","first-page":"1941","DOI":"10.1109\/TIFS.2017.2697402","volume":"12","author":"D Valsesia","year":"2017","unstructured":"Valsesia, D., Coluccia, G., Bianchi, T., Magli, E.: User authentication via PRNU-based physical unclonable functions. IEEE Trans. Inf. Forensics Secur. 12(8), 1941\u20131956 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR87","doi-asserted-by":"crossref","unstructured":"Van hamme, T., R\u00faa, E.A., Preuveneers, D., Joosen, W.: Gait template protection using HMM-UBM. In: 2018 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1\u20138 (2018)","DOI":"10.23919\/BIOSIG.2018.8553315"},{"key":"8_CR88","doi-asserted-by":"publisher","unstructured":"Van hamme, T., Garofalo, G., Argones R\u00faa, E., Preuveneers, D., Joosen, W.: A systematic comparison of age and gender prediction on IMU sensor-based gait traces. Sensors 19(13), 2945 (2019). https:\/\/doi.org\/10.3390\/s19132945","DOI":"10.3390\/s19132945"},{"key":"8_CR89","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1007\/978-3-319-61176-1_26","volume-title":"Data and Applications Security and Privacy XXXI","author":"T Van hamme","year":"2017","unstructured":"Van hamme, T., Preuveneers, D., Joosen, W.: Improving resilience of behaviometric based continuous authentication with multiple accelerometers. In: Livraga, G., Zhu, S. (eds.) DBSec 2017. LNCS, vol. 10359, pp. 473\u2013485. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-61176-1_26"},{"key":"8_CR90","doi-asserted-by":"publisher","unstructured":"Van hamme, T., Preuveneers, D., Joosen, W.: Managing distributed trust relationships for multi-modal authentication. J. Inf. Secur. Appl. 40, 258 \u2013 270 (2018). https:\/\/doi.org\/10.1016\/j.jisa.2018.01.003. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S2214212617304180","DOI":"10.1016\/j.jisa.2018.01.003"},{"key":"8_CR91","unstructured":"Wang, M., Deng, W.: Deep face recognition: a survey (2019)"},{"key":"8_CR92","doi-asserted-by":"publisher","first-page":"26218","DOI":"10.1109\/ACCESS.2019.2891603","volume":"7","author":"Y Wang","year":"2019","unstructured":"Wang, Y., Wu, C., Zheng, K., Wang, X.: Improving reliability: user authentication on smartphones using keystroke biometrics. IEEE Access 7, 26218\u201326228 (2019)","journal-title":"IEEE Access"},{"key":"8_CR93","unstructured":"Wu, M.M.A., Schneider, O.S., Karuei, I., Leong, L., MacLean, K.: Introducing GaitLib: a library for real-time gait analysis in smartphones (2014)"},{"key":"8_CR94","doi-asserted-by":"publisher","unstructured":"Yan, C., Long, Y., Ji, X., Xu, W.: The catcher in the field: a fieldprint based spoofing detection for text-independent speaker verification. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201919, pp. 1215\u20131229. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3319535.3354248","DOI":"10.1145\/3319535.3354248"},{"issue":"1","key":"8_CR95","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/34.982883","volume":"24","author":"MH Yang","year":"2002","unstructured":"Yang, M.H., Kriegman, D.J., Ahuja, N.: Detecting faces in images: a survey. IEEE Trans. Pattern Anal. Mach. Intell. 24(1), 34\u201358 (2002)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"8_CR96","doi-asserted-by":"publisher","unstructured":"Yao, S., Hu, S., Zhao, Y., Zhang, A., Abdelzaher, T.: DeepSense: a unified deep learning framework for time-series mobile sensing data processing. In: Proceedings of the 26th International Conference on World Wide Web, WWW \u201917, pp. 351\u2013360. International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland (2017). https:\/\/doi.org\/10.1145\/3038912.3052577","DOI":"10.1145\/3038912.3052577"},{"key":"8_CR97","unstructured":"Zhang, C., Zhang, Z.: A survey of recent advances in face detection (2010)"},{"key":"8_CR98","doi-asserted-by":"crossref","unstructured":"Zhang, G., Yan, C., Ji, X., Zhang, T., Zhang, T., Xu, W.: DolphinAttack: inaudible voice commands. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 103\u2013117 (2017)","DOI":"10.1145\/3133956.3134052"},{"issue":"10","key":"8_CR99","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","volume":"23","author":"K Zhang","year":"2016","unstructured":"Zhang, K., Zhang, Z., Li, Z., Qiao, Y.: Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process. Lett. 23(10), 1499\u20131503 (2016). https:\/\/doi.org\/10.1109\/LSP.2016.2603342","journal-title":"IEEE Signal Process. Lett."},{"key":"8_CR100","doi-asserted-by":"publisher","unstructured":"Zhao, B.Z.H., Asghar, H.J., Kaafar, M.A.: On the resilience of biometric authentication systems against random inputs. In: Proceedings 2020 Network and Distributed System Security Symposium (2020). https:\/\/doi.org\/10.14722\/ndss.2020.24210","DOI":"10.14722\/ndss.2020.24210"},{"issue":"4","key":"8_CR101","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1145\/954339.954342","volume":"35","author":"W Zhao","year":"2003","unstructured":"Zhao, W., Chellappa, R., Phillips, P.J., Rosenfeld, A.: Face recognition: a literature survey. ACM Comput. Surv. (CSUR) 35(4), 399\u2013458 (2003)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"8_CR102","doi-asserted-by":"publisher","unstructured":"Zhao, Y., Zhou, S.: Wearable device-based gait recognition using angle embedded gait dynamic images and a convolutional neural network. Sensors 17(3) (2017). https:\/\/doi.org\/10.3390\/s17030478. http:\/\/www.mdpi.com\/1424-8220\/17\/3\/478","DOI":"10.3390\/s17030478"},{"key":"8_CR103","doi-asserted-by":"publisher","unstructured":"Zhong, Y., Deng, Y.: Sensor orientation invariant mobile gait biometrics. In: IEEE International Joint Conference on Biometrics, pp. 1\u20138 (2014). https:\/\/doi.org\/10.1109\/BTAS.2014.6996246","DOI":"10.1109\/BTAS.2014.6996246"},{"key":"8_CR104","unstructured":"Zhu, X., Ramanan, D.: Face detection, pose estimation, and landmark localization in the wild. In: 2012 IEEE Conference on Computer Vision and Pattern Recognition, pp. 2879\u20132886. IEEE (2012)"}],"container-title":["Lecture Notes in Computer Science","Security and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-98795-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,21]],"date-time":"2024-09-21T19:49:05Z","timestamp":1726948145000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-98795-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030987947","9783030987954"],"references-count":104,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-98795-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"8 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}