{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T05:16:38Z","timestamp":1775193398791,"version":"3.50.1"},"reference-count":117,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T00:00:00Z","timestamp":1568332800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"LaBRI for emerging projects"},{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Ministry of Higher Education and Scientific Research of Tunisia"},{"DOI":"10.13039\/501100001807","name":"Funda\u00e7\u00e3o de Amparo \u00e0 Pesquisa do Estado de S\u00e3o Paulo","doi-asserted-by":"crossref","award":["2012\/25032-0"],"award-info":[{"award-number":["2012\/25032-0"]}],"id":[{"id":"10.13039\/501100001807","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001807","name":"Funda\u00e7\u00e3o de Amparo \u00e0 Pesquisa do Estado de S\u00e3o Paulo","doi-asserted-by":"crossref","award":["2013\/07375-0"],"award-info":[{"award-number":["2013\/07375-0"]}],"id":[{"id":"10.13039\/501100001807","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2020,9,30]]},"abstract":"<jats:p>With the widespread of computing and mobile devices, authentication using biometrics has received greater attention. Although biometric systems usually provide good solutions, the recognition performance tends to be affected over time due to changing conditions and aging of biometric data, which results in intra-class variability. Adaptive biometric systems, which adapt the biometric reference over time, have been proposed to deal with such intra-class variability. This article provides the most up-to-date and complete discussion on adaptive biometrics systems we are aware of, including formalization, terminology, sources or variations that motivates the use of adaptation, adaptation strategies, evaluation methodology, and open challenges. This field of research is sometimes referred to as template update.<\/jats:p>","DOI":"10.1145\/3344255","type":"journal-article","created":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T12:28:56Z","timestamp":1568377736000},"page":"1-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":44,"title":["Adaptive Biometric Systems"],"prefix":"10.1145","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5231-6766","authenticated-orcid":false,"given":"Paulo Henrique","family":"Pisani","sequence":"first","affiliation":[{"name":"Universidade Federal do ABC and Universidade de S\u00e3o Paulo, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9652-9210","authenticated-orcid":false,"given":"Abir","family":"Mhenni","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de Sousse and University of Tunis El Manar, Tunisia; Normandie University, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0638-7504","authenticated-orcid":false,"given":"Romain","family":"Giot","sequence":"additional","affiliation":[{"name":"University of Bordeaux, France"}]},{"given":"Estelle","family":"Cherrier","sequence":"additional","affiliation":[{"name":"Normandie University, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6076-0309","authenticated-orcid":false,"given":"Norman","family":"Poh","sequence":"additional","affiliation":[{"name":"Truststamp, Atlanta, Georgia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4765-6459","authenticated-orcid":false,"given":"Andr\u00e9 Carlos Ponce de Leon","family":"Ferreira de Carvalho","sequence":"additional","affiliation":[{"name":"Universidade de S\u00e3o Paulo, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2042-9029","authenticated-orcid":false,"given":"Christophe","family":"Rosenberger","sequence":"additional","affiliation":[{"name":"Normandie University, France"}]},{"given":"Najoua Essoukri Ben","family":"Amara","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de Sousse, Tunisia"}]}],"member":"320","published-online":{"date-parts":[[2019,9,13]]},"reference":[{"key":"e_1_2_2_1_1","volume-title":"Data Classification","author":"Aggarwal Charu C.","unstructured":"Charu C. Aggarwal . 2015. Data Classification . Chapman and Hall\/CRC. Charu C. Aggarwal. 2015. Data Classification. Chapman and Hall\/CRC."},{"key":"e_1_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIBIM.2014.7015437"},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1762222.1762304"},{"key":"e_1_2_2_4_1","volume-title":"Proceedings of the International Conference on Machine Learning (ICML\u201905)","author":"Bengio Samy","year":"2005","unstructured":"Samy Bengio , Johnny Mari\u00e9thoz , and Mikaela Keller . 2005 . The expected performance curve . In Proceedings of the International Conference on Machine Learning (ICML\u201905) , Workshop on ROC Analysis in Machine Learning. 1--8. Samy Bengio, Johnny Mari\u00e9thoz, and Mikaela Keller. 2005. The expected performance curve. In Proceedings of the International Conference on Machine Learning (ICML\u201905), Workshop on ROC Analysis in Machine Learning. 1--8."},{"key":"e_1_2_2_5_1","volume-title":"Proceedings of the International Conference on Biometrics (ICB\u201913)","author":"Biggio B.","unstructured":"B. Biggio , L. Didaci , G. Fumera , and F. Roli . 2013. Poisoning attacks to compromise face templates . In Proceedings of the International Conference on Biometrics (ICB\u201913) . 1--7. B. Biggio, L. Didaci, G. Fumera, and F. Roli. 2013. Poisoning attacks to compromise face templates. In Proceedings of the International Conference on Biometrics (ICB\u201913). 1--7."},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34166-3_46"},{"key":"e_1_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2426728"},{"key":"e_1_2_2_8_1","volume-title":"Pattern Recognition and Machine Learning","author":"Bishop Christopher M.","unstructured":"Christopher M. Bishop . 2006. Pattern Recognition and Machine Learning . Springer . Christopher M. Bishop. 2006. Pattern Recognition and Machine Learning. Springer."},{"key":"e_1_2_2_9_1","volume-title":"Proceedings of the 18th International Conference on Machine Learning.","author":"Blum Avrim","year":"2001","unstructured":"Avrim Blum and Shuchi Chawla . 2001 . Learning from labeled and unlabeled data using graph mincuts . In Proceedings of the 18th International Conference on Machine Learning. Avrim Blum and Shuchi Chawla. 2001. Learning from labeled and unlabeled data using graph mincuts. In Proceedings of the 18th International Conference on Machine Learning."},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/279943.279962"},{"key":"e_1_2_2_11_1","volume-title":"Proceedings of the International Workshop on Biometric Technologies (BT\u201904)","author":"Cappelli Raffaele","unstructured":"Raffaele Cappelli , D. Maio , and D. Maltoni . 2004. SFinGe: An approach to synthetic fingerprint generation . In Proceedings of the International Workshop on Biometric Technologies (BT\u201904) . 147--154. Raffaele Cappelli, D. Maio, and D. Maltoni. 2004. SFinGe: An approach to synthetic fingerprint generation. In Proceedings of the International Workshop on Biometric Technologies (BT\u201904). 147--154."},{"key":"e_1_2_2_12_1","unstructured":"John W. Carls. 2009. A Framework for Analyzing Biometric Template Aging and Renewal Prediction. ProQuest.   John W. Carls. 2009. A Framework for Analyzing Biometric Template Aging and Renewal Prediction. ProQuest."},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791156"},{"key":"e_1_2_2_14_1","volume-title":"Semi-Supervised Learning","author":"Chapelle Olivier","unstructured":"Olivier Chapelle , Bernhard Scholkopf , and Alexander Zien . 2006. Semi-Supervised Learning . MIT Press . Olivier Chapelle, Bernhard Scholkopf, and Alexander Zien. 2006. Semi-Supervised Learning. MIT Press."},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2004.127"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2013.05.021"},{"key":"e_1_2_2_17_1","volume-title":"Proceedings of the 5th WSEAS International Conference on Computational Intelligence, Man-Machine Systems and Cybernetics. 296--301","author":"Gayar Neamat El","year":"2006","unstructured":"Neamat El Gayar , Shaban A. Shaban , and Sayed Hamdy . 2006 . Face recognition with semi-supervised learning and multiple classifiers . In Proceedings of the 5th WSEAS International Conference on Computational Intelligence, Man-Machine Systems and Cybernetics. 296--301 . Neamat El Gayar, Shaban A. Shaban, and Sayed Hamdy. 2006. Face recognition with semi-supervised learning and multiple classifiers. In Proceedings of the 5th WSEAS International Conference on Computational Intelligence, Man-Machine Systems and Cybernetics. 296--301."},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSD.2013.6564044"},{"key":"e_1_2_2_19_1","volume-title":"Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW\u201912)","author":"Fenker S. P.","unstructured":"S. P. Fenker and K. W. Bowyer . 2012. Analysis of template aging in iris biometrics . In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW\u201912) . 45--51. S. P. Fenker and K. W. Bowyer. 2012. Analysis of template aging in iris biometrics. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW\u201912). 45--51."},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69812-8_88"},{"key":"e_1_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89689-0_78"},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1972.1054809"},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2016.07.002"},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIBIM.2011.5949216"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.03.004"},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1736406.1736474"},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2012.10"},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2012.9"},{"key":"e_1_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2012.6374539"},{"key":"e_1_2_2_30_1","volume-title":"Proceedings of the International Biometric Performance Testing Conference (IBPC\u201912)","author":"Giot Romain","year":"2012","unstructured":"Romain Giot , Christophe Rosenberger , and Bernadette Dorizzi . 2012 . Performance evaluation of biometric template update . In Proceedings of the International Biometric Performance Testing Conference (IBPC\u201912) . Romain Giot, Christophe Rosenberger, and Bernadette Dorizzi. 2012. Performance evaluation of biometric template update. In Proceedings of the International Biometric Performance Testing Conference (IBPC\u201912)."},{"key":"e_1_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2013.27"},{"key":"e_1_2_2_32_1","volume-title":"Proceedings of the Instrumentation and Measurement Technology Conference (IMTC\u201908)","author":"Grabham N. J.","unstructured":"N. J. Grabham and N. M. White . 2008. Use of a novel keypad biometric for enhanced user identity verification . In Proceedings of the Instrumentation and Measurement Technology Conference (IMTC\u201908) . 12--16. N. J. Grabham and N. M. White. 2008. Use of a novel keypad biometric for enhanced user identity verification. In Proceedings of the Instrumentation and Measurement Technology Conference (IMTC\u201908). 12--16."},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1968.1054155"},{"key":"e_1_2_2_34_1","volume-title":"Advances in Biometrics, NaliniK","author":"Himaga Mitsutoshi","unstructured":"Mitsutoshi Himaga and Katsuhiro Kou . 2008. Finger vein authentication technology and financial applications . In Advances in Biometrics, NaliniK . Ratha and Venu Govindaraju (Eds.). Springer , London , 89--105. Mitsutoshi Himaga and Katsuhiro Kou. 2008. Finger vein authentication technology and financial applications. In Advances in Biometrics, NaliniK. Ratha and Venu Govindaraju (Eds.). Springer, London, 89--105."},{"key":"e_1_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.008"},{"key":"e_1_2_2_36_1","unstructured":"Apple Inc. 2017. Face ID Security. Retrieved from https:\/\/www.apple.com\/business\/site\/docs\/FaceID_Security_Guide.pdf.  Apple Inc. 2017. Face ID Security. Retrieved from https:\/\/www.apple.com\/business\/site\/docs\/FaceID_Security_Guide.pdf."},{"key":"e_1_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"e_1_2_2_38_1","volume-title":"Biometric Authentication","author":"Jain Anil K.","unstructured":"Anil K. Jain , Sarat C. Dass , and Karthik Nandakumar . 2004. Soft biometric traits for personal recognition systems . In Biometric Authentication . Springer , 731--738. Anil K. Jain, Sarat C. Dass, and Karthik Nandakumar. 2004. Soft biometric traits for personal recognition systems. In Biometric Authentication. Springer, 731--738."},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2015.12.013"},{"key":"e_1_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1023807"},{"key":"e_1_2_2_41_1","volume-title":"Advances in Biometrics","author":"Kang Pilsung","unstructured":"Pilsung Kang , Seong-seob Hwang, and Sungzoon Cho . 2007. Continual retraining of keystroke dynamics-based authenticator . In Advances in Biometrics . Springer , 1203--1211. Pilsung Kang, Seong-seob Hwang, and Sungzoon Cho. 2007. Continual retraining of keystroke dynamics-based authenticator. In Advances in Biometrics. Springer, 1203--1211."},{"key":"e_1_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1523103.1523161"},{"key":"e_1_2_2_43_1","volume-title":"Recent Advances in Intrusion Detection, Somesh Jha, Robin Sommer, and Christian Kreibich (Eds.).","author":"Killourhy Kevin","unstructured":"Kevin Killourhy and Roy Maxion . 2010. Why did my detector do that?! predicting keystroke-dynamics error rates . In Recent Advances in Intrusion Detection, Somesh Jha, Robin Sommer, and Christian Kreibich (Eds.). Vol. 6307 . Springer Berlin , 256--276. Kevin Killourhy and Roy Maxion. 2010. Why did my detector do that?! predicting keystroke-dynamics error rates. In Recent Advances in Intrusion Detection, Somesh Jha, Robin Sommer, and Christian Kreibich (Eds.). Vol. 6307. Springer Berlin, 256--276."},{"key":"e_1_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1964897.1964918"},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2003653.2003656"},{"key":"e_1_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.11.004"},{"key":"e_1_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/NWESP.2005.62"},{"key":"e_1_2_2_48_1","volume-title":"FVC2002: Second fingerprint verification competition. In Proceedings of the 16th International Conference on Pattern Recognition","volume":"3","author":"Maio D.","unstructured":"D. Maio , D. Maltoni , R. Cappelli , J. L. Wayman , and A. K. Jain . 2002 . FVC2002: Second fingerprint verification competition. In Proceedings of the 16th International Conference on Pattern Recognition , Vol. 3 . 811--814. D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, and A. K. Jain. 2002. FVC2002: Second fingerprint verification competition. In Proceedings of the 16th International Conference on Pattern Recognition, Vol. 3. 811--814."},{"key":"e_1_2_2_49_1","volume-title":"Proceedings of the 11th International Conference on Information Science, Signal Processing and Their Applications (ISSPA\u201912)","author":"Marcialis G. L.","unstructured":"G. L. Marcialis , L. Didaci , A. Pisano , E. Granger , and F. Roli . 2012. Why template self-update should work in biometric authentication systems? In Proceedings of the 11th International Conference on Information Science, Signal Processing and Their Applications (ISSPA\u201912) . 1086--1091. G. L. Marcialis, L. Didaci, A. Pisano, E. Granger, and F. Roli. 2012. Why template self-update should work in biometric authentication systems? In Proceedings of the 11th International Conference on Information Science, Signal Processing and Their Applications (ISSPA\u201912). 1086--1091."},{"key":"e_1_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-11-494"},{"key":"e_1_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.039"},{"key":"e_1_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.02.002"},{"key":"e_1_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2018.8450401"},{"key":"e_1_2_2_55_1","volume-title":"Proceedings of the International Conference on Digital Society and eGovernments (ICDS\u201918)","author":"Mhenni Abir","year":"2018","unstructured":"Abir Mhenni , Estelle Cherrier , Christophe Rosenberger , and Najoua Essoukri Ben Amara . 2018 . Towards a secured authentication based on an online double serial adaptive mechanism of users\u2019 keystroke dynamics . In Proceedings of the International Conference on Digital Society and eGovernments (ICDS\u201918) . 73--80. Abir Mhenni, Estelle Cherrier, Christophe Rosenberger, and Najoua Essoukri Ben Amara. 2018. Towards a secured authentication based on an online double serial adaptive mechanism of users\u2019 keystroke dynamics. In Proceedings of the International Conference on Digital Society and eGovernments (ICDS\u201918). 73--80."},{"key":"e_1_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/CW.2018.00066"},{"key":"e_1_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ATSIP.2016.7523122"},{"key":"e_1_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/CW.2018.00068"},{"key":"e_1_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2014.09.016"},{"key":"e_1_2_2_60_1","volume-title":"Proceedings of the 16th International Conference in Central Europe on Computer Graphics, Visualization, and Computer Vision","volume":"2008","author":"Noval Ricardo Garc\u00eda","year":"2008","unstructured":"Ricardo Garc\u00eda Noval and Francisco Perales L\u00f3pez . 2008 . Adaptative templates in biometric authentication . In Proceedings of the 16th International Conference in Central Europe on Computer Graphics, Visualization, and Computer Vision , Vol. 2008 . 14. Ricardo Garc\u00eda Noval and Francisco Perales L\u00f3pez. 2008. Adaptative templates in biometric authentication. In Proceedings of the 16th International Conference in Central Europe on Computer Graphics, Visualization, and Computer Vision, Vol. 2008. 14."},{"key":"e_1_2_2_61_1","doi-asserted-by":"crossref","unstructured":"C. Pagano E. Granger R. Sabourin P. Tuveri G. L. Marcialis and F. Roli. 2015. Context-sensitive self-updating for adaptive face recognition. In Adaptive Biometric Systems. Springer 9--34.  C. Pagano E. Granger R. Sabourin P. Tuveri G. L. Marcialis and F. Roli. 2015. Context-sensitive self-updating for adaptive face recognition. In Adaptive Biometric Systems. Springer 9--34.","DOI":"10.1007\/978-3-319-24865-3_2"},{"key":"e_1_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.04.004"},{"key":"e_1_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2018.111144956"},{"key":"e_1_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/BRACIS.2014.67"},{"key":"e_1_2_2_66_1","volume-title":"Proceedings of the International Joint Conference on Neural Networks (IJCNN\u201915)","author":"Pisani Paulo Henrique","unstructured":"Paulo Henrique Pisani , Ana Carolina Lorena , and Andr\u00e9 C. P. L. F. de Carvalho. 2015. Adaptive approches for keystroke dynamics . In Proceedings of the International Joint Conference on Neural Networks (IJCNN\u201915) . 1--8. Paulo Henrique Pisani, Ana Carolina Lorena, and Andr\u00e9 C. P. L. F. de Carvalho. 2015. Adaptive approches for keystroke dynamics. In Proceedings of the International Joint Conference on Neural Networks (IJCNN\u201915). 1--8."},{"key":"e_1_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-014-0148-0"},{"key":"e_1_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/BRACIS.2015.29"},{"key":"e_1_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-150403"},{"key":"e_1_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.07.014"},{"key":"e_1_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2041660"},{"key":"e_1_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2014.0107"},{"key":"e_1_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.306"},{"key":"e_1_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIBIM.2014.7015447"},{"key":"e_1_2_2_75_1","volume-title":"Adaptive Biometric Systems","author":"Poh Norman","unstructured":"Norman Poh , Joseph Kittler , and Ajita Rattani . 2015. Handling session mismatch by semi-supervised-based co-training scheme . In Adaptive Biometric Systems . Springer , 35--49. Norman Poh, Joseph Kittler, and Ajita Rattani. 2015. Handling session mismatch by semi-supervised-based co-training scheme. In Adaptive Biometric Systems. Springer, 35--49."},{"key":"e_1_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.5555\/1736406.1736445"},{"key":"e_1_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2012.0019"},{"key":"e_1_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01793-3_77"},{"key":"e_1_2_2_79_1","unstructured":"Precise Biometrics. 2014. Understanding Biometric Performance Evaluation. Retrieved from http:\/\/precisebiometrics.com\/wp-content\/uploads\/2014\/11\/White-Paper-Understanding-Biometric-Performance-Evaluation.pdf.  Precise Biometrics. 2014. Understanding Biometric Performance Evaluation. Retrieved from http:\/\/precisebiometrics.com\/wp-content\/uploads\/2014\/11\/White-Paper-Understanding-Biometric-Performance-Evaluation.pdf."},{"key":"e_1_2_2_81_1","volume-title":"Introduction to Adaptive Biometric Systems","author":"Rattani Ajita","unstructured":"Ajita Rattani . 2015. Introduction to Adaptive Biometric Systems . Springer International Publishing , 1--8. Ajita Rattani. 2015. Introduction to Adaptive Biometric Systems. Springer International Publishing, 1--8."},{"key":"e_1_2_2_82_1","volume-title":"Proceedings of the IEEE International Symposium on Technologies for Homeland Security (HST\u201917)","author":"Rattani A.","unstructured":"A. Rattani and R. Derakhshani . 2017. Online co-training in mobile ocular biometric recognition . In Proceedings of the IEEE International Symposium on Technologies for Homeland Security (HST\u201917) . 1--5. A. Rattani and R. Derakhshani. 2017. Online co-training in mobile ocular biometric recognition. In Proceedings of the IEEE International Symposium on Technologies for Homeland Security (HST\u201917). 1--5."},{"key":"e_1_2_2_83_1","volume-title":"ICIP 2016 competition on mobile ocular biometric recognition. In Proceedings of the IEEE International Conference on Image Processing (ICIP\u201916)","author":"Rattani A.","unstructured":"A. Rattani , R. Derakhshani , S. K. Saripalle , and V. Gottemukkula . 2016 . ICIP 2016 competition on mobile ocular biometric recognition. In Proceedings of the IEEE International Conference on Image Processing (ICIP\u201916) . 320--324. A. Rattani, R. Derakhshani, S. K. Saripalle, and V. Gottemukkula. 2016. ICIP 2016 competition on mobile ocular biometric recognition. In Proceedings of the IEEE International Conference on Image Processing (ICIP\u201916). 320--324."},{"key":"e_1_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01793-3_86"},{"key":"e_1_2_2_85_1","volume-title":"Proceedings of the 21st International Conference on Pattern Recognition (ICPR\u201912)","author":"Rattani Ajita","year":"2012","unstructured":"Ajita Rattani , Gian Luca Marcialis , Eric Granger , and Fabio Roli . 2012 . A dual-staged classification-selection approach for automated update of biometric templates . In Proceedings of the 21st International Conference on Pattern Recognition (ICPR\u201912) . 2972--2975. Ajita Rattani, Gian Luca Marcialis, Eric Granger, and Fabio Roli. 2012. A dual-staged classification-selection approach for automated update of biometric templates. In Proceedings of the 21st International Conference on Pattern Recognition (ICPR\u201912). 2972--2975."},{"key":"e_1_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/BSYM.2008.4655518"},{"key":"e_1_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2008.4563116"},{"key":"e_1_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04146-4_47"},{"key":"e_1_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIBIM.2011.5949222"},{"key":"e_1_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2012.10.004"},{"key":"e_1_2_2_91_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJBM.2013.055961"},{"key":"e_1_2_2_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2013.6707791"},{"key":"e_1_2_2_93_1","volume-title":"Proceedings of the IEEE International Joint Conference on Biometrics. 1--8.","author":"Rattani A.","unstructured":"A. Rattani and A. Ross . 2014. Automatic adaptation of fingerprint liveness detector to new spoof materials . In Proceedings of the IEEE International Joint Conference on Biometrics. 1--8. A. Rattani and A. Ross. 2014. Automatic adaptation of fingerprint liveness detector to new spoof materials. In Proceedings of the IEEE International Joint Conference on Biometrics. 1--8."},{"key":"e_1_2_2_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/89.365379"},{"key":"e_1_2_2_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1975.1055464"},{"key":"e_1_2_2_96_1","volume-title":"Advances in Biometrics, NaliniK","author":"Roli Fabio","unstructured":"Fabio Roli , Luca Didaci , and GianLuca Marcialis . 2008. Adaptive biometric systems that can improve with use . In Advances in Biometrics, NaliniK . Ratha and Venu Govindaraju (Eds.). Springer , London , 447--471. Fabio Roli, Luca Didaci, and GianLuca Marcialis. 2008. Adaptive biometric systems that can improve with use. In Advances in Biometrics, NaliniK. Ratha and Venu Govindaraju (Eds.). Springer, London, 447--471."},{"key":"e_1_2_2_97_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74549-5_124"},{"key":"e_1_2_2_98_1","doi-asserted-by":"publisher","DOI":"10.1007\/11815921_61"},{"key":"e_1_2_2_99_1","volume-title":"Jain","author":"Ross Arun A.","year":"2006","unstructured":"Arun A. Ross , Karthik Nandakumar , and Anil K . Jain . 2006 . Handbook of Multibiometrics. Vol. 6 . Springer Science 8 Business Media. Arun A. Ross, Karthik Nandakumar, and Anil K. Jain. 2006. Handbook of Multibiometrics. Vol. 6. Springer Science 8 Business Media."},{"key":"e_1_2_2_100_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2006.1105"},{"key":"e_1_2_2_101_1","volume-title":"Automatic template update strategies for biometrics","author":"Scheidat Tobias","unstructured":"Tobias Scheidat , Andrey Makrushin , and Claus Vielhauer . 2007. Automatic template update strategies for biometrics . Otto-von-Guericke University of Magdeburg , Magdeburg, Germany . Tobias Scheidat, Andrey Makrushin, and Claus Vielhauer. 2007. Automatic template update strategies for biometrics. Otto-von-Guericke University of Magdeburg, Magdeburg, Germany."},{"key":"e_1_2_2_102_1","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"e_1_2_2_103_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR\u201915)","author":"Schroff F.","unstructured":"F. Schroff , D. Kalenichenko , and J. Philbin . 2015. FaceNet: A unified embedding for face recognition and clustering . In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR\u201915) . 815--823. F. Schroff, D. Kalenichenko, and J. Philbin. 2015. FaceNet: A unified embedding for face recognition and clustering. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR\u201915). 815--823."},{"key":"e_1_2_2_104_1","volume-title":"Security Sales and Integration","author":"Willis Ashley","unstructured":"Ashley Willis , Scott Goldfine , and Rodney Bosch . 2015. Security Sales and Integration . EH Publishing . Ashley Willis, Scott Goldfine, and Rodney Bosch. 2015. Security Sales and Integration. EH Publishing."},{"key":"e_1_2_2_105_1","volume-title":"Proceedings of the 3rd International Workshop on Security and Communication Networks (IWSCN\u201911)","author":"Mark","unstructured":"Mark M. Seeger and Patrick Bours. 2011. How to comprehensively describe a biometric update mechanisms for keystroke dynamics . In Proceedings of the 3rd International Workshop on Security and Communication Networks (IWSCN\u201911) . 59--65. Mark M. Seeger and Patrick Bours. 2011. How to comprehensively describe a biometric update mechanisms for keystroke dynamics. In Proceedings of the 3rd International Workshop on Security and Communication Networks (IWSCN\u201911). 59--65."},{"key":"e_1_2_2_106_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2013.51"},{"key":"e_1_2_2_107_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.12.003"},{"key":"e_1_2_2_108_1","doi-asserted-by":"publisher","DOI":"10.1109\/5254.920593"},{"key":"e_1_2_2_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190618"},{"key":"e_1_2_2_110_1","doi-asserted-by":"publisher","DOI":"10.5555\/1577069.1755839"},{"key":"e_1_2_2_111_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.11.012"},{"key":"e_1_2_2_112_1","volume-title":"Enhancing weak Biometric Authentication by Adaptation and Improved User-discrimination. Master\u2019s thesis","author":"Vandana Kumari","unstructured":"Kumari Vandana . 2007. Enhancing weak Biometric Authentication by Adaptation and Improved User-discrimination. Master\u2019s thesis . International Institute of Information Technology , Hyderabad, India . Kumari Vandana. 2007. Enhancing weak Biometric Authentication by Adaptation and Improved User-discrimination. Master\u2019s thesis. International Institute of Information Technology, Hyderabad, India."},{"key":"e_1_2_2_113_1","volume-title":"Proceedings of the IEEE 5th International Conference on Biometrics: Theory, Applications and Systems (BTAS\u201912)","author":"Wang Zibo","unstructured":"Zibo Wang , Abdul Serwadda , Kiran S. Balagani , and Vir V. Phoha . 2012. Transforming animals in a cyber-behavioral biometric menagerie with frog-boiling attacks . In Proceedings of the IEEE 5th International Conference on Biometrics: Theory, Applications and Systems (BTAS\u201912) . 289--296. Zibo Wang, Abdul Serwadda, Kiran S. Balagani, and Vir V. Phoha. 2012. Transforming animals in a cyber-behavioral biometric menagerie with frog-boiling attacks. In Proceedings of the IEEE 5th International Conference on Biometrics: Theory, Applications and Systems (BTAS\u201912). 289--296."},{"key":"e_1_2_2_114_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1972.4309137"},{"key":"e_1_2_2_115_1","volume-title":"Proceedings of the 5th IAPR International Conference on Biometrics (ICB\u201912)","author":"Yambay David","unstructured":"David Yambay , Luca Ghiani , Paolo Denti , Gian Luca Marcialis , Fabio Roli , and S. Schuckers . 2012. LivDet 2011\u2014Fingerprint liveness detection competition 2011 . In Proceedings of the 5th IAPR International Conference on Biometrics (ICB\u201912) . IEEE, 208--215. David Yambay, Luca Ghiani, Paolo Denti, Gian Luca Marcialis, Fabio Roli, and S. Schuckers. 2012. LivDet 2011\u2014Fingerprint liveness detection competition 2011. In Proceedings of the 5th IAPR International Conference on Biometrics (ICB\u201912). IEEE, 208--215."},{"key":"e_1_2_2_116_1","volume-title":"Face and gait recognition based on semi-supervised learning","author":"Yu Qiuhong","unstructured":"Qiuhong Yu , Yilong Yin , Gongping Yang , Yanbing Ning , and Yanan Li. 2012. Face and gait recognition based on semi-supervised learning . In Pattern Recognition, Cheng-Lin Liu, Changshui Zhang, and Liang Wang (Eds.). Vol. 321 . Springer , Berlin , 284--291. Qiuhong Yu, Yilong Yin, Gongping Yang, Yanbing Ning, and Yanan Li. 2012. Face and gait recognition based on semi-supervised learning. In Pattern Recognition, Cheng-Lin Liu, Changshui Zhang, and Liang Wang (Eds.). Vol. 321. Springer, Berlin, 284--291."},{"key":"e_1_2_2_117_1","volume-title":"Proceedings of the 19th European Signal Processing Conference. 1979--1983","author":"Zhao Xuran","year":"2011","unstructured":"Xuran Zhao , Nicholas Evans , and Jean-Luc Dugelay . 2011 . A co-training approach to automatic face recognition . In Proceedings of the 19th European Signal Processing Conference. 1979--1983 . Xuran Zhao, Nicholas Evans, and Jean-Luc Dugelay. 2011. A co-training approach to automatic face recognition. In Proceedings of the 19th European Signal Processing Conference. 1979--1983."},{"key":"e_1_2_2_119_1","volume-title":"Proceedings of the International Conference on Machine Learning (ICML\u201903)","volume":"3","author":"Zhu Xiaojin","unstructured":"Xiaojin Zhu , Zoubin Ghahramani , John Lafferty et al. 2003. Semi-supervised learning using gaussian fields and harmonic functions . In Proceedings of the International Conference on Machine Learning (ICML\u201903) , Vol. 3 . 912--919. Xiaojin Zhu, Zoubin Ghahramani, John Lafferty et al. 2003. Semi-supervised learning using gaussian fields and harmonic functions. In Proceedings of the International Conference on Machine Learning (ICML\u201903), Vol. 3. 912--919."},{"key":"e_1_2_2_120_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-014-5441-4"},{"key":"e_1_2_2_121_1","volume-title":"Proceedings of the IEEE International Conference on Identity, Security, and Behavior Analysis (ISBA\u201917)","author":"\u00c7eker H.","unstructured":"H. \u00c7eker and S. Upadhyaya . 2017. Transfer learning in long-text keystroke dynamics . In Proceedings of the IEEE International Conference on Identity, Security, and Behavior Analysis (ISBA\u201917) . 1--6. H. \u00c7eker and S. Upadhyaya. 2017. Transfer learning in long-text keystroke dynamics. In Proceedings of the IEEE International Conference on Identity, Security, and Behavior Analysis (ISBA\u201917). 1--6."}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3344255","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3344255","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:24Z","timestamp":1750203864000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3344255"}},"subtitle":["Review and Perspectives"],"short-title":[],"issued":{"date-parts":[[2019,9,13]]},"references-count":117,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,9,30]]}},"alternative-id":["10.1145\/3344255"],"URL":"https:\/\/doi.org\/10.1145\/3344255","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,13]]},"assertion":[{"value":"2017-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-09-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}