Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
With biometrics playing the role of a password which can not be replaced if stolen, the necessity of establishing counter- measures to biometric spoofing attacks has been recognized. Regardless of the biometric mode, the typical approach of anti-spoofing s ...
Digital images, taken for example with a smartphone, are usually geo-tagged with location and viewing direction information. This information is not always accurate due to, for example, GPS inaccuracies in large cities. The aim of this project is to develo ...
Finger vein recognition is a recent biometric application, which relies on the use of human finger vein patterns beneath the skin's surface. While several methods have been proposed in the literature, its applicability to uncontrolled scenarios has not yet ...
Biometric recognition using the palm vein characteristics is emerging as a touchless and spoof-resistant hand-based means to identify individuals or to verify their identity. One of the open challenges in this field is the creation of fast and modality-dep ...
The vulnerability of finger vein recognition to spoofing is studied in this paper. A collection of spoofing finger vein images has been created from real finger vein samples. Finger vein images are printed using a commercial printer and then, presented at ...
Spoofing is the act of masquerading as a valid user by falsifying data to gain an illegitimate access. Vulnerability of recognition systems to spoofing attacks (presentation attacks) is still an open security issue in biometrics domain and among all biomet ...
This study examines session variability modelling for face authentication using Gaussian mixture models. Session variability modelling aims to explicitly model and suppress detrimental within-class (inter-session) variation. The authors examine two techniq ...
This paper examines session variability modelling for face authentication using Gaussian mixture models. Session variability modelling aims to explicitly model and suppress detrimental within-class (inter-session) variation. We examine two techniques to do ...
It is important in biometric person recognition systems to protect personal data and privacy of users. This paper introduces a new mechanism to revoke and protect fingerprint minutiae information, which can be used in today’s security-aware society. The re ...
Poor quality of fingerprint data is one of the major problems concerning latent fingerprint matching in forensic applications. Local quality of fingerprint plays a very important role in this application field to ensure high recognition performance. Al- th ...