IET Biometrics

Papers
(The median citation count of IET Biometrics is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
A Survey on Deepfake Video Detection87
A survey of face recognition techniques under occlusion82
Cross‐ethnicity face anti‐spoofing recognition challenge: A review46
Extended evaluation of the effect of real and simulated masks on face recognition performance32
Detection of non‐suicidal self‐injury based on spatiotemporal features of indoor activities27
Face morphing detection in the presence of printing/scanning and heterogeneous image sources21
Password policy characteristics and keystroke biometric authentication18
Facial masks and soft‐biometrics: Leveraging face recognition CNNs for age and gender prediction on mobile ocular images17
Robust medical zero‐watermarking algorithm based on Residual‐DenseNet16
A multimodal retina‐iris biometric system using the Levenshtein distance for spatial feature comparison13
Multi‐task learning using GNet features and SVM classifier for signature identification12
Masked face recognition: Human versus machine12
On the generalisation capabilities of Fisher vector‐based face presentation attack detection12
Texture feature column scheme for single‐ and multi‐script writer identification12
3D landmark‐based face restoration for recognition using variational autoencoder and triplet loss12
Robust watermarking algorithm for medical images based on accelerated‐KAZE discrete cosine transform10
HandSegNet: Hand segmentation using convolutional neural network for contactless palmprint recognition10
Framework for user behavioural biometric identification using a multimodal scheme with keystroke trajectory feature and recurrent neural network on a mobile platform10
Facial expression recognition using singular values and wavelet‐based LGC‐HD operator10
A deep biometric hash learning framework for three advanced hand‐based biometrics9
Mobile keystroke dynamics for biometric recognition: An overview9
Occlusion‐invariant face recognition using simultaneous segmentation8
CNN‐based off‐angle iris segmentation and recognition8
Local feature encoding for unknown presentation attack detection: An analysis of different local feature descriptors8
Basic finger inner‐knuckle print: A new hand biometric modality7
Deep learning model based on cascaded autoencoders and one‐class learning for detection and localization of anomalies from surveillance videos7
A robust deep learning approach for glasses detection in non‐standard facial images7
Proposing a Fuzzy Soft‐max‐based classifier in a hybrid deep learning architecture for human activity recognition7
Writer identification and writer retrieval based on NetVLAD with Re‐ranking7
A fully rotation invariant multi‐camera finger vein recognition system6
An empirical analysis of keystroke dynamics in passwords: A longitudinal study6
Exploring presentation attack vulnerability and usability of face recognition systems6
Recognition of human Iris for biometric identification using Daugman’s method6
Producing secure multimodal biometric descriptors using artificial neural networks6
An exploratory study of interpretability for face presentation attack detection5
Impact of facial tattoos and paintings on face recognition systems5
Palmprint recognition based on the line feature local tri‐directional patterns5
Optimal feature‐algorithm combination research for EEG fatigue driving detection based on functional brain network5
Unimodal‐Bio‐GAN: Keyless biometric salting scheme based on generative adversarial network5
Point‐convolution‐based human skeletal pose estimation on millimetre wave frequency modulated continuous wave multiple‐input multiple‐output radar5
EEG personal recognition based on ‘qualified majority’ over signal patches5
VID: Human identification through vein patterns captured from commodity depth cameras4
Towards pen‐holding hand pose recognition: A new benchmark and a coarse‐to‐fine PHHP recognition network4
On the fly biometric identification system using hand‐geometry4
Gradient boosting regression for faster Partitioned Iterated Function Systems‐based head pose estimation4
Pixel‐wise supervision for presentation attack detection on identity document cards4
On the generalisation capabilities of fingerprint presentation attack detection methods in the short wave infrared domain4
Effects of image compression on face image manipulation detection: A case study on facial retouching4
SviaB: Secure and verifiable multi‐instance iris remote authentication using blockchain4
Hybrid biometric template protection: Resolving the agony of choice between bloom filters and homomorphic encryption4
Face presentation attack detection. A comprehensive evaluation of the generalisation problem4
Multiresolution synthetic fingerprint generation3
Profile to frontal face recognition in the wild using coupled conditional generative adversarial network3
Securable networked scheme with face authentication3
Hybrid face recognition under adverse conditions using appearance‐based and dynamic features of smile expression3
Privacy‐preserving speaker verification system based on binary I‐vectors3
Data augmentation with occluded facial features for age and gender estimation3
Analysis of the synthetic periocular iris images for robust Presentation Attacks Detection algorithms3
Reliable detection of doppelgängers based on deep face representations3
Protection of gait data set for preserving its privacy in deep learning pipeline3
Lip print‐based identification using traditional and deep learning3
Personal identification based on acoustic characteristics of outer ear using cepstral analysis, Bayesian classifier, and artificial neural networks3
Preventing face morphing attacks by using legacy face images3
Robust graph fusion and recognition framework for fingerprint and finger‐vein3
Unknown presentation attack detection against rational attackers3
2
Time–frequency fusion learning for photoplethysmography biometric recognition2
Corresponding keypoint constrained sparse representation three‐dimensional ear recognition via one sample per person2
Efficient ear alignment using a two‐stack hourglass network2
On the Potential of Algorithm Fusion for Demographic Bias Mitigation in Face Recognition2
Locality preserving binary face representations using auto‐encoders2
Extended IMD2020: a large‐scale annotated dataset tailored for detecting manipulated images2
Spoofing detection on adaptive authentication System‐A survey2
Towards understanding the character of quality sampling in deep learning face recognition2
Face morphing attacks and face image quality: The effect of morphing and the unsupervised attack detection by quality2
Subject independent evaluation of eyebrows as a stand‐alone biometric2
Heartbeat information prediction based on transformer model using millimetre‐wave radar2
Brainprint based on functional connectivity and asymmetry indices of brain regions: A case study of biometric person identification with non‐expensive electroencephalogram headsets2
Biometric privacy protection: What is this thing called privacy?2
Transferability analysis of adversarial attacks on gender classification to face recognition: Fixed and variable attack perturbation2
Activity‐based electrocardiogram biometric verification using wearable devices2
0.091890096664429