{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T20:30:49Z","timestamp":1775766649684,"version":"3.50.1"},"reference-count":33,"publisher":"MDPI AG","issue":"13","license":[{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Portuguese Mint and Official Printing Office (INCM)","award":["TrustFaces"],"award-info":[{"award-number":["TrustFaces"]}]},{"DOI":"10.13039\/501100005727","name":"University of Coimbra","doi-asserted-by":"publisher","award":["TrustFaces"],"award-info":[{"award-number":["TrustFaces"]}],"id":[{"id":"10.13039\/501100005727","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Applied Sciences"],"abstract":"<jats:p>Various modern security systems follow a tendency to simplify the usage of the existing biometric recognition solutions and embed them into ubiquitous portable devices. In this work, we continue the investigation and development of our method for securing identification documents. The original facial biometric template, which is extracted from the trusted frontal face image, is stored on the identification document in a secured personalized machine-readable code. Such document is protected from face photo manipulation and may be validated with an offline mobile application. We apply automatic methods of compressing the developed face descriptors to make the biometric validation system more suitable for mobile applications. As an additional contribution, we introduce several print-capture datasets that may be used for training and evaluating similar systems for mobile identification and travel documents validation.<\/jats:p>","DOI":"10.3390\/app11136134","type":"journal-article","created":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T12:03:27Z","timestamp":1625141007000},"page":"6134","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Towards Facial Biometrics for ID Document Validation in Mobile Devices"],"prefix":"10.3390","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2372-9681","authenticated-orcid":false,"given":"Iurii","family":"Medvedev","sequence":"first","affiliation":[{"name":"Institute of Systems and Robotics, University of Coimbra, R. Silvio Lima, 3030-194 Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4399-4845","authenticated-orcid":false,"given":"Farhad","family":"Shadmand","sequence":"additional","affiliation":[{"name":"Institute of Systems and Robotics, University of Coimbra, R. Silvio Lima, 3030-194 Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3354-4007","authenticated-orcid":false,"given":"Leandro","family":"Cruz","sequence":"additional","affiliation":[{"name":"Institute of Systems and Robotics, University of Coimbra, R. Silvio Lima, 3030-194 Coimbra, Portugal"},{"name":"Siemens Process Systems Engineering, London W6 7HA, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1854-049X","authenticated-orcid":false,"given":"Nuno","family":"Gon\u00e7alves","sequence":"additional","affiliation":[{"name":"Institute of Systems and Robotics, University of Coimbra, R. Silvio Lima, 3030-194 Coimbra, Portugal"},{"name":"Portuguese Mint and Official Printing Office (INCM), 1000-042 Lisbon, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2021,7,1]]},"reference":[{"key":"ref_1","unstructured":"Thieme, M. (2008). Biometrics Market and Industry Report 2009\u20132014, International Biometric Group. Tech. Rep."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Ramachandra, R., and Busch, C. (2017). Presentation Attack Detection Methods for Face Recognition Systems: A Comprehensive Survey. ACM Comput. Surv., 50.","DOI":"10.1145\/3038924"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Kumar, S., Singh, S., and Kumar, J. (2017, January 5\u20136). A comparative study on face spoofing attacks. Proceedings of the 2017 International Conference on Computing, Communication and Automation (ICCCA), Greater Noida, India.","DOI":"10.1109\/CCAA.2017.8229961"},{"key":"ref_4","unstructured":"ISO\/IEC 19794-5:2011 (2021, May 13). Information Technology\u2014Biometric Data Interchange Formats\u2014Part 5: Face Image Data, Available online: https:\/\/www.iso.org\/standard\/50867.html."},{"key":"ref_5","unstructured":"Medvedev, I., Gon\u00e7alves, N., and Cruz, L. (2020, January 16\u201318). Biometric System for Mobile Validation of ID And Travel Documents. Proceedings of the 2020 International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MSP.2017.2764116","article-title":"Deep Learning for Understanding Faces: Machines May Be Just as Good, or Better, than Humans","volume":"35","author":"Ranjan","year":"2018","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Jin, X., and Tan, X. (2016). Face Alignment In-the-Wild: A Survey. Comput. Vis. Image Underst.","DOI":"10.1016\/j.cviu.2017.08.008"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Taigman, Y., Yang, M., Ranzato, M., and Wolf, L. (2014, January 24\u201327). DeepFace: Closing the Gap to Human-Level Performance in Face Verification. Proceedings of the 2014 IEEE Conference CVPR, Columbus, OH, USA.","DOI":"10.1109\/CVPR.2014.220"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"681","DOI":"10.1109\/34.927467","article-title":"Active Appearance Models","volume":"23","author":"Cootes","year":"2001","journal-title":"Pattern Anal. Mach. Intell. IEEE Trans."},{"key":"ref_10","first-page":"2733","article-title":"Face recognition technique based on active appearance model","volume":"8","author":"Abdulameer","year":"2013","journal-title":"Int. Rev. Comput. Softw."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Ouarda, W., Trichili, H., Alimi, A.M., and Solaiman, B. (2014, January 11\u201314). Face recognition based on geometric features using Support Vector Machines. Proceedings of the 2014 6th International Conference SoCPaR, Tunis, Tunisia.","DOI":"10.1109\/SOCPAR.2014.7007987"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Juhong, A., and Pintavirooj, C. (September, January 31). Face recognition based on facial landmark detection. Proceedings of the 2017 10th Biomedical Engineering International Conference (BMEiCON), Hokkaido, Japan.","DOI":"10.1109\/BMEiCON.2017.8229173"},{"key":"ref_13","first-page":"469","article-title":"Face Recognition with Local Binary Patterns","volume":"3021","author":"Ahonen","year":"2004","journal-title":"Eur. Conf. Comput. Vis."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Shen, Y., and Chiu, C. (2015, January 19\u201324). Local binary pattern orientation based face recognition. Proceedings of the 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), South Brisbane, Australia.","DOI":"10.1109\/ICASSP.2015.7178138"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1016\/S1007-0214(11)70032-3","article-title":"Histogram of the Oriented Gradient for Face Recognition","volume":"16","author":"Shu","year":"2011","journal-title":"Tsinghua Sci. Technol."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1598","DOI":"10.1016\/j.patrec.2011.01.004","article-title":"Face recognition using Histograms of Oriented Gradients","volume":"32","author":"Deniz","year":"2011","journal-title":"Pattern Recognit. Lett."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Wang, L., Chen, K., and Ong, Y.S. (2005). Face Recognition Using Gabor Features and Support Vector Machines. Advances in Natural Computation, Springer.","DOI":"10.1007\/11539087"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., and Philbin, J. (2015, January 7\u201312). FaceNet: A unified embedding for face recognition and clustering. Proceedings of the 2015 IEEE Conference CVPR, Boston, MA, USA.","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2833","DOI":"10.1109\/TMM.2020.2966863","article-title":"An Equalized Margin Loss for Face Recognition","volume":"22","author":"Sun","year":"2020","journal-title":"IEEE Trans. Multimed."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., and Zafeiriou, S. (2019, January 16\u201320). ArcFace: Additive Angular Margin Loss for Deep Face Recognition. Proceedings of the 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, CA, USA.","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Liu, W., Wen, Y., Yu, Z., Li, M., Raj, B., and Song, L. (2017, January 21\u201326). SphereFace: Deep Hypersphere Embedding for Face Recognition. Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Honolulu, HI, USA.","DOI":"10.1109\/CVPR.2017.713"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Shi, Y., and Jain, A.K. (2018, January 22\u201325). DocFace: Matching ID Document Photos to Selfies. Proceedings of the 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS), Redondo Beach, CA, USA.","DOI":"10.1109\/BTAS.2018.8698596"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1117\/12.549894","article-title":"Enhanced optical security by using information carrier digital screening","volume":"Volume 5310","year":"2004","journal-title":"Optical Security and Counterfeit Deterrence Techniques V"},{"key":"ref_24","unstructured":"Jones, R.L., and Eckel, R.A. (2019). Line Segment Code for Embedding Information in an Image. (Application No. 16\/236,068), U.S. Patent."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Grother, P., and Ngan, M. (2021, May 13). Face Recognition Vendor Test (FRVT) Performance of Face Identification Algorithms NIST IR 8009, Available online: https:\/\/www.nist.gov\/publications\/face-recognition-vendor-test-frvt-performance-face-identification-algorithms-nist-ir.","DOI":"10.6028\/NIST.IR.8381"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"LeCun, Y., Bottou, G.O., and Muller, K.R. (1998). Efficient Backprop, in Neural Networks\u2014Tricks of the Trade, Springer. Springer Lecture Notes in Computer Sciences.","DOI":"10.1007\/3-540-49430-8_2"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Cruz, L., Patr\u00e3o, B., and Gon\u00e7alves, N. (2018, January 10\u201312). Graphic Code: A New Machine Readable Approach. Proceedings of the 2018 IEEE International Conference AIVR, Taichung, Taiwan.","DOI":"10.1109\/AIVR.2018.00036"},{"key":"ref_28","unstructured":"Ferrara, M., Franco, A., and Maltoni, D. (2019). Face morphing detection in the presence of printing\/scanning and heterogeneous image sources. arXiv."},{"key":"ref_29","unstructured":"Mitkovski, A., Merkle, J., Rathgeb, C., Tams, B., Bernardo, K., Haryanto, N.E., and Busch, C. (2020, January 16\u201318). Simulation of Print-Scan Transformations for Face Images based on Conditional Adversarial Networks. Proceedings of the 2020 International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany."},{"key":"ref_30","unstructured":"School of Natural Sciences University of Stirling (2021, May 13). Psychological Image Collection of Stirling. Available online: http:\/\/pics.stir.ac.uk."},{"key":"ref_31","unstructured":"Martinez, A., and Benavente, R. (2021, May 13). The AR Face Database. Tech. Rep. 24 CVC Technical Report. Available online: http:\/\/www2.ece.ohio-state.edu\/~aleix\/ARdatabase.html."},{"key":"ref_32","unstructured":"Itseez (2021, May 13). Open Source Computer Vision Library. Available online: https:\/\/github.com\/itseez\/opencv."},{"key":"ref_33","unstructured":"Gon\u00e7alves, N.M., Cruz, L., and Medvedev, I. (2020). Method for Validation of Authenticity of an Image Present in an Object, Object with Increased Security Level and Method for Preparation Thereof, Computer Equipment, Computer Program and Appropriate Reading Means. (No. WO2020251380A1), Portugal Patent."}],"container-title":["Applied Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2076-3417\/11\/13\/6134\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T06:24:36Z","timestamp":1760163876000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2076-3417\/11\/13\/6134"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,1]]},"references-count":33,"journal-issue":{"issue":"13","published-online":{"date-parts":[[2021,7]]}},"alternative-id":["app11136134"],"URL":"https:\/\/doi.org\/10.3390\/app11136134","relation":{},"ISSN":["2076-3417"],"issn-type":[{"value":"2076-3417","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,1]]}}}