Algorithm testing

Who passed iBeta’s attack detection tests presentation

Uncommon identification methods

   Смех Laughing
   Крдиограмма By cardiogram
   Походка By gait
    By bioacoustic signature
    By mouth
    Using a laser to scan veins
    Identification by ear biometrics
    Identification about teeth (smile)
    Identification by phone gyroscope and accelerometer

Deep Morphing

Vulnerability of Face Recognition to Deep Morphing
Pavel Korshunov and Sebastien Marcel Idiap Research Institute, Martigny, Switzerland

Spoofing detection

«Global Identity» Fraud Report 2020Shufti Pro,2020
Shufti Pro,2020

Exposing gan-generated faces using inconsistent corneal specular highlights
Shu Hu, Yuezun Li, and Siwei Lyu
Computer Science and Engineering University at Buffalo, State University of New York, USA

Leveraging Frequency Analysis for Deep Fake Image Recognition
Joel Frank, Thorsten Eisenhofer, Lea Schonherr, Asja Fischer, Dorothea Kolossa, Thorsten Holz 

Detection of spoofing attacks on the facial biometrics system
I.A. Kalinovsky, G.M. Lavrentieva


Cross-modal Identity Leakage between Biometrics and Devices
Chris Xiaoxuan Lu, Yang Li, Yuanbo Xiangli, Zhengxiong Li
The growing issue of the cost of payment fraud
Goode Intelligence
Synthetic Identity Fraud in the U.S. Payment System
A Review of Causes and Contributing Factors


Biometric payment cards are they the game changer for financial inclusion?
IDEX Biometrics
Enabling biometric technologies to eliminate biometric data storage
Infinity Optics
Methods and algorithms for automatic processing of iris images
Matveev Ivan Aleksandrovich