IET Biometrics

Papers
(The median citation count of IET Biometrics is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
A survey of face recognition techniques under occlusion65
A Survey on Deepfake Video Detection65
Cross‐ethnicity face anti‐spoofing recognition challenge: A review39
Extended evaluation of the effect of real and simulated masks on face recognition performance30
PRNU‐based detection of facial retouching29
BMIAE: blockchain‐based multi‐instance Iris authentication using additive ElGamal homomorphic encryption25
Detection of non‐suicidal self‐injury based on spatiotemporal features of indoor activities21
Face morphing detection in the presence of printing/scanning and heterogeneous image sources18
Democratic voting downsampling for coding‐based palmprint recognition17
Password policy characteristics and keystroke biometric authentication16
Face morph detection for unknown morphing algorithms and image sources: a multi‐scale block local binary pattern fusion approach16
DeepFuseOSV: online signature verification using hybrid feature fusion and depthwise separable convolution neural network architecture16
Facial masks and soft‐biometrics: Leveraging face recognition CNNs for age and gender prediction on mobile ocular images16
EEG‐based biometric identification using frequency‐weighted power feature13
3D landmark‐based face restoration for recognition using variational autoencoder and triplet loss12
Robust medical zero‐watermarking algorithm based on Residual‐DenseNet11
Palmprint recognition using state‐of‐the‐art local texture descriptors: a comparative study11
Texture feature column scheme for single‐ and multi‐script writer identification11
Masked face recognition: Human versus machine10
Deep convolutional neural networks for face and iris presentation attack detection: survey and case study10
Multi‐task learning using GNet features and SVM classifier for signature identification10
On the generalisation capabilities of Fisher vector‐based face presentation attack detection9
A multimodal retina‐iris biometric system using the Levenshtein distance for spatial feature comparison9
PROTECT: Pervasive and useR fOcused biomeTrics bordEr projeCT – a case study8
Occlusion‐invariant face recognition using simultaneous segmentation8
Mobile keystroke dynamics for biometric recognition: An overview8
Facial expression recognition using singular values and wavelet‐based LGC‐HD operator8
A deep biometric hash learning framework for three advanced hand‐based biometrics8
Robust watermarking algorithm for medical images based on accelerated‐KAZE discrete cosine transform7
Review of gait recognition approaches and their challenges on view changes7
Framework for user behavioural biometric identification using a multimodal scheme with keystroke trajectory feature and recurrent neural network on a mobile platform7
Proposing a Fuzzy Soft‐max‐based classifier in a hybrid deep learning architecture for human activity recognition6
A robust deep learning approach for glasses detection in non‐standard facial images6
HandSegNet: Hand segmentation using convolutional neural network for contactless palmprint recognition6
Writer identification and writer retrieval based on NetVLAD with Re‐ranking6
Deep learning model based on cascaded autoencoders and one‐class learning for detection and localization of anomalies from surveillance videos6
A fully rotation invariant multi‐camera finger vein recognition system5
Impact of facial tattoos and paintings on face recognition systems5
CNN‐based off‐angle iris segmentation and recognition5
Producing secure multimodal biometric descriptors using artificial neural networks5
An exploratory study of interpretability for face presentation attack detection5
Recognition of human Iris for biometric identification using Daugman’s method5
An empirical analysis of keystroke dynamics in passwords: A longitudinal study4
Basic finger inner‐knuckle print: A new hand biometric modality4
Unimodal‐Bio‐GAN: Keyless biometric salting scheme based on generative adversarial network4
Exploring presentation attack vulnerability and usability of face recognition systems4
EEG personal recognition based on ‘qualified majority’ over signal patches4
Towards pen‐holding hand pose recognition: A new benchmark and a coarse‐to‐fine PHHP recognition network4
Effects of image compression on face image manipulation detection: A case study on facial retouching4
Local feature encoding for unknown presentation attack detection: An analysis of different local feature descriptors4
SviaB: Secure and verifiable multi‐instance iris remote authentication using blockchain4
Data behind mobile behavioural biometrics – a survey4
On the generalisation capabilities of fingerprint presentation attack detection methods in the short wave infrared domain4
Face presentation attack detection. A comprehensive evaluation of the generalisation problem4
Data augmentation with occluded facial features for age and gender estimation3
Analysis of the synthetic periocular iris images for robust Presentation Attacks Detection algorithms3
Securable networked scheme with face authentication3
Personal identification based on acoustic characteristics of outer ear using cepstral analysis, Bayesian classifier, and artificial neural networks3
Point‐convolution‐based human skeletal pose estimation on millimetre wave frequency modulated continuous wave multiple‐input multiple‐output radar3
Two‐tiered face verification with low‐memory footprint for mobile devices3
Multiresolution synthetic fingerprint generation3
Hybrid biometric template protection: Resolving the agony of choice between bloom filters and homomorphic encryption3
On the fly biometric identification system using hand‐geometry3
Subject independent evaluation of eyebrows as a stand‐alone biometric2
Brainprint based on functional connectivity and asymmetry indices of brain regions: A case study of biometric person identification with non‐expensive electroencephalogram headsets2
Time–frequency fusion learning for photoplethysmography biometric recognition2
Spoofing detection on adaptive authentication System‐A survey2
Unknown presentation attack detection against rational attackers2
Fingerprint enhancement using multi‐scale classification dictionaries with reduced dimensionality2
Optimal feature‐algorithm combination research for EEG fatigue driving detection based on functional brain network2
Palmprint recognition based on the line feature local tri‐directional patterns2
Protection of gait data set for preserving its privacy in deep learning pipeline2
Reliable detection of doppelgängers based on deep face representations2
Pixel‐wise supervision for presentation attack detection on identity document cards2
Efficient ear alignment using a two‐stack hourglass network2
Lip print‐based identification using traditional and deep learning2
Face morphing attacks and face image quality: The effect of morphing and the unsupervised attack detection by quality2
Preventing face morphing attacks by using legacy face images2
Constant‐Q magnitude–phase coefficients extraction for synthetic speech detection2
Robust graph fusion and recognition framework for fingerprint and finger‐vein2
Extended IMD2020: a large‐scale annotated dataset tailored for detecting manipulated images2
VID: Human identification through vein patterns captured from commodity depth cameras2
Privacy‐preserving speaker verification system based on binary I‐vectors2
Profile to frontal face recognition in the wild using coupled conditional generative adversarial network2
0.019036054611206