Algorithm testing
Who passed iBeta’s attack detection tests presentation
Uncommon identification methods
Laughing
By cardiogram
By gait
By bioacoustic signature
By mouth
Using a laser to scan veins
Identification by ear biometrics
Identification about teeth (smile)
Identification by phone gyroscope and accelerometer
Deep Morphing
Vulnerability of Face Recognition to Deep Morphing
Pavel Korshunov and Sebastien Marcel Idiap Research Institute, Martigny, Switzerland
Spoofing detection
«Global Identity» Fraud Report 2020Shufti Pro,2020
Shufti Pro,2020
Exposing gan-generated faces using inconsistent corneal specular highlights
Shu Hu, Yuezun Li, and Siwei Lyu
Computer Science and Engineering University at Buffalo, State University of New York, USA
Leveraging Frequency Analysis for Deep Fake Image Recognition
Joel Frank, Thorsten Eisenhofer, Lea Schonherr, Asja Fischer, Dorothea Kolossa, Thorsten Holz
Detection of spoofing attacks on the facial biometrics system
I.A. Kalinovsky, G.M. Lavrentieva
Fraud
Cross-modal Identity Leakage between Biometrics and Devices
Chris Xiaoxuan Lu, Yang Li, Yuanbo Xiangli, Zhengxiong Li
The growing issue of the cost of payment fraud
Goode Intelligence
Synthetic Identity Fraud in the U.S. Payment System
A Review of Causes and Contributing Factors
Review
Biometric payment cards are they the game changer for financial inclusion?
IDEX Biometrics
Enabling biometric technologies to eliminate biometric data storage
Infinity Optics
Methods and algorithms for automatic processing of iris images
Matveev Ivan Aleksandrovich