2016
DOI: 10.1109/thms.2015.2412944
|View full text |Cite
|
Sign up to set email alerts
|

Biometric-Enabled Authentication Machines: A Survey of Open-Set Real-World Applications

Abstract: This paper revisits the concept of an authentication machine (A-machine) that aims at identifying/verifying humans. Although A-machines in the closed-set application scenario are well understood and commonly used for access control utilizing human biometrics (face, iris, and fingerprints), open-set applications of Amachines have yet to be equally characterized. This paper presents an analysis and taxonomy of A-machines, trends, and challenges of open-set real-world applications. This paper makes the following … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
33
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 41 publications
(33 citation statements)
references
References 55 publications
(99 reference statements)
0
33
0
Order By: Relevance
“…or by Estwood et al. [ 43 , 44 ]. Facial recognition also focuses on expression recognition to extract emotional features, see an article by Zhang and Tjondronegoro [ 45 ], or features collected in databases containing variations expected in real conditions, see an article by Zhang et al.…”
Section: Related Workmentioning
confidence: 99%
“…or by Estwood et al. [ 43 , 44 ]. Facial recognition also focuses on expression recognition to extract emotional features, see an article by Zhang and Tjondronegoro [ 45 ], or features collected in databases containing variations expected in real conditions, see an article by Zhang et al.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, the design of an application that supports online interview has been proposed by Eastwood et al 220 The application is based on polygraph principles and is not directly dependent upon human involvements. 220 The application uses the tactic of questioning and answering as important features. Both physiological and behavioral attributes are extracted from the user during the interview.…”
Section: Biometric Application Supporting Interviewsmentioning
confidence: 99%
“…Biometric-based person identification systems have attracted considerable attention owing to their advantages in a wide range of applications, such as access control, home security monitoring, surveillance, and personalized customer services [1][2][3], where accuracy in the identification of individuals is paramount. To achieve this goal, various biometric technologies have been developed, such as ear, face, fingerprint, gait, iris, palmprint, and voice [4][5][6][7][8][9][10].…”
Section: Introductionmentioning
confidence: 99%