Search Results for author: Marta Gomez-Barrero

Found 14 papers, 2 papers with code

Reversing the Irreversible: A Survey on Inverse Biometrics

no code implementations5 Jan 2024 Marta Gomez-Barrero, Javier Galbally

With the widespread use of biometric recognition, several issues related to the privacy and security provided by this technology have been recently raised and analysed.

General Framework to Evaluate Unlinkability in Biometric Template Protection Systems

no code implementations8 Nov 2023 Marta Gomez-Barrero, Javier Galbally, Christian Rathgeb, Christoph Busch

The wide deployment of biometric recognition systems in the last two decades has raised privacy concerns regarding the storage and use of biometric data.

Introduction to Presentation Attack Detection in Iris Biometrics and Recent Advances

no code implementations24 Nov 2021 Aythami Morales, Julian Fierrez, Javier Galbally, Marta Gomez-Barrero

Iris recognition technology has attracted an increasing interest in the last decades in which we have witnessed a migration from research laboratories to real world applications.

Iris Recognition

Differential Anomaly Detection for Facial Images

no code implementations7 Oct 2021 Mathias Ibsen, Lázaro J. González-Soler, Christian Rathgeb, Pawel Drozdowski, Marta Gomez-Barrero, Christoph Busch

Due to their convenience and high accuracy, face recognition systems are widely employed in governmental and personal security applications to automatically recognise individuals.

Anomaly Detection Face Recognition +1

SVC-onGoing: Signature Verification Competition

1 code implementation13 Aug 2021 Ruben Tolosana, Ruben Vera-Rodriguez, Carlos Gonzalez-Garcia, Julian Fierrez, Aythami Morales, Javier Ortega-Garcia, Juan Carlos Ruiz-Garcia, Sergio Romero-Tapiador, Santiago Rengifo, Miguel Caruana, Jiajia Jiang, Songxuan Lai, Lianwen Jin, Yecheng Zhu, Javier Galbally, Moises Diaz, Miguel Angel Ferrer, Marta Gomez-Barrero, Ilya Hodashinsky, Konstantin Sarin, Artem Slezkin, Marina Bardamova, Mikhail Svetlakov, Mohammad Saleem, Cintia Lia Szucs, Bence Kovari, Falk Pulsmeyer, Mohamad Wehbi, Dario Zanca, Sumaiya Ahmad, Sarthak Mishra, Suraiya Jabin

This article presents SVC-onGoing, an on-going competition for on-line signature verification where researchers can easily benchmark their systems against the state of the art in an open common platform using large-scale public databases, such as DeepSignDB and SVC2021_EvalDB, and standard experimental protocols.

Task 2

On the Generalisation Capabilities of Fisher Vector based Face Presentation Attack Detection

no code implementations2 Mar 2021 Lázaro J. González-Soler, Marta Gomez-Barrero, Christoph Busch

In order to mitigate those security concerns, most face Presentation Attack Detection techniques have reported a good detection performance when they are evaluated on known Presentation Attack Instruments (PAI) and acquisition conditions, in contrast to more challenging scenarios where unknown attacks are included in the test set.

Face Presentation Attack Detection

Selfie Periocular Verification using an Efficient Super-Resolution Approach

no code implementations16 Feb 2021 Juan Tapia, Andres Valenzuela, Rodrigo Lara, Marta Gomez-Barrero, Christoph Busch

Selfie-based biometrics has great potential for a wide range of applications since, e. g. periocular verification is contactless and is safe to use in pandemics such as COVID-19, when a major portion of a face is covered by a facial mask.

Image Super-Resolution

On the Generalisation Capabilities of Fingerprint Presentation Attack Detection Methods in the Short Wave Infrared Domain

no code implementations19 Oct 2020 Jascha Kolberg, Marta Gomez-Barrero, Christoph Busch

Therefore, presentation attack detection (PAD) methods are of utmost importance in order to distinguish between bona fide and attack presentations.

Texture-based Presentation Attack Detection for Automatic Speaker Verification

no code implementations8 Oct 2020 Lazaro J. Gonzalez-Soler, Jose Patino, Marta Gomez-Barrero, Massimiliano Todisco, Christoph Busch, Nicholas Evans

Despite these and other advantages, biometric systems in general and Automatic speaker verification (ASV) systems in particular can be vulnerable to attack presentations.

Speaker Verification

Biometric Presentation Attack Detection: Beyond the Visible Spectrum

no code implementations28 Feb 2019 Ruben Tolosana, Marta Gomez-Barrero, Christoph Busch, Javier Ortega-Garcia

The increased need for unattended authentication in multiple scenarios has motivated a wide deployment of biometric systems in the last few years.

Cannot find the paper you are looking for? You can Submit a new open access paper.