Computational Intelligence for Biometric Applications Vincenzo Piuri Università degli Studi di Milano, Italy In cooperation with Ruggero Donida Labati,

Slides:



Advertisements
Similar presentations
Contactless and Pose Invariant Biometric Identification Using Hand Surface Vivek Kanhangad, Ajay Kumar, Senior Member, IEEE, and David Zhang, Fellow, IEEE.
Advertisements

IIIT Hyderabad Pose Invariant Palmprint Recognition Chhaya Methani and Anoop Namboodiri Centre for Visual Information Technology IIIT, Hyderabad, INDIA.
Software Quality Ranking: Bringing Order to Software Modules in Testing Fei Xing Michael R. Lyu Ping Guo.
Suggested Term Projects CSE 666, Fall Guidelines The described projects are suggestions; if you have desire, skills or idea to explore alternative.
Cascaded Filtering For Biometric Identification Using Random Projection Atif Iqbal.
Face Recognition & Biometric Systems, 2005/2006 Face recognition process.
G. Valenzise *, L. Gerosa, M. Tagliasacchi *, F. Antonacci *, A. Sarti * IEEE Int. Conf. On Advanced Video and Signal-based Surveillance, 2007 * Dipartimento.
Biometrics: Faces and Identity Verification in a Networked World
Information Fusion in Multibiometric Systems
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
New Geometric Methods of Mixture Models for Interactive Visualization PIs: Jia Li, Xiaolong (Luke) Zhang, Bruce Lindsay Department of Statistics College.
1 Learning to Detect Objects in Images via a Sparse, Part-Based Representation S. Agarwal, A. Awan and D. Roth IEEE Transactions on Pattern Analysis and.
Symmetric hash functions for fingerprint minutiae
Overview of Computer Vision CS491E/791E. What is Computer Vision? Deals with the development of the theoretical and algorithmic basis by which useful.
CONTENT BASED FACE RECOGNITION Ankur Jain 01D05007 Pranshu Sharma Prashant Baronia 01D05005 Swapnil Zarekar 01D05001 Under the guidance of Prof.
Biometrics II CUBS, University at Buffalo
FIT3105 Biometric based authentication and identity management
Engineering Data Analysis & Modeling Practical Solutions to Practical Problems Dr. James McNames Biomedical Signal Processing Laboratory Electrical & Computer.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
Object Recognition Using Geometric Hashing
Face Recognition: A Comparison of Appearance-Based Approaches
Biometrics Austen Hayes and Cody Powell. Overview  What is Biometrics?  Types of Biometric Recognition  Applications of Biometric Systems  Types of.
Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics IEEE Trans on PAMI, VOL. 25, NO.9, 2003 Kyong Chang, Kevin W. Bowyer,
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Automatic Fingerprint Verification Principal Investigator Venu Govindaraju, Ph.D. Graduate Students T.Jea, Chaohang Wu, Sharat S.Chikkerur.
Mahesh Sukumar Subramanian Srinivasan. Introduction Face detection - determines the locations of human faces in digital images. Binary pattern-classification.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
Biometrics: Identity Verification in a Networked World
Uba Anydiewu, Shane Bilinski, Luis Garcia, Lauren Ragland, Debracca Thornton, Joe Tubesing, Kevin Chan, Steve Elliott, and Ben Petry EXAMINING INTRA-VISIT.
Biometrics: Ear Recognition
LÊ QU Ố C HUY ID: QLU OUTLINE  What is data mining ?  Major issues in data mining 2.
Performance Evaluation of Grouping Algorithms Vida Movahedi Elder Lab - Centre for Vision Research York University Spring 2009.
Introduction to Biometric Systems
Pattern Recognition Vidya Manian Dept. of Electrical and Computer Engineering University of Puerto Rico INEL 5046, Spring 2007
Clustering methods Course code: Pasi Fränti Speech & Image Processing Unit School of Computing University of Eastern Finland Joensuu,
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
Compiled By: Raj G Tiwari.  A pattern is an object, process or event that can be given a name.  A pattern class (or category) is a set of patterns sharing.
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
Symmetric hash functions for fingerprint minutiae S. Tulyakov, V. Chavan and V. Govindaraju Center for Unified Biometrics and Sensors SUNY at Buffalo,
An Information Fusion Approach for Multiview Feature Tracking Esra Ataer-Cansizoglu and Margrit Betke ) Image and.
A Comparison in Handmetric between Quaternion Euclidean Product Distance and Cauchy Schwartz Inequality Distance Di Liu Dong-mei Sun Zheng-ding Qiu Institute.
Jun-Won Suh Intelligent Electronic Systems Human and Systems Engineering Department of Electrical and Computer Engineering Speaker Verification System.
Object Recognition in Images Slides originally created by Bernd Heisele.
Online Kinect Handwritten Digit Recognition Based on Dynamic Time Warping and Support Vector Machine Journal of Information & Computational Science, 2015.
Biometrics Authentication Technology
1 Terrorists Face recognition of suspicious and (in most cases) evil homo-sapiens.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
Biometric Technologies
1 Machine Vision. 2 VISION the most powerful sense.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Human Activity Recognition, Biometrics and Cybersecurity Mohamed Abdel-Mottaleb, Ph.D. Image Processing and Computer Vision Department of Electrical and.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
FieldTraining Seminar on Field Training Seminar on “Hand-Geometry Based Person Authentication System ” By By Ullesh Chavadi M Ullesh Chavadi M.
ANITHA L ROLL NO :4 M.TECH[CSE]. LITERATURE SURVEY PROPOSED SYSTEM PERFORMANCE STUDY INTRODUCTION OBJECTIVE.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Face Detection 蔡宇軒.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
VIDYA PRATISHTHAN’S COLLEGE OF ENGINEERING, BARAMATI.
Under Guidance of Mr. A. S. Jalal Associate Professor Dept. of Computer Engineering and Applications GLA University, Mathura Presented by Dev Drume Agrawal.
Signature Recognition Using Neural Networks and Rule Based Decision Systems CSC 8810 Computational Intelligence Instructor Dr. Yanqing Zhang Presented.
BIOMETRICS VOICE RECOGNITION. Meaning Bios : LifeMetron : Measure Bios : LifeMetron : Measure Biometrics are used to identify the input sample when compared.
Study on Deep Learning in Speaker Recognition Lantian Li CSLT / RIIT Tsinghua University May 26, 2016.
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Multimodal Biometric Security
Face Recognition using Artificial Neural Network
Faculty of Science IT Department Lecturer: Raz Dara MA.
Presentation transcript:

Computational Intelligence for Biometric Applications Vincenzo Piuri Università degli Studi di Milano, Italy In cooperation with Ruggero Donida Labati, Angelo Genovese, Enrique Muñoz, Fabio Scotti and Gianluca Sforza EU FP7 Project “ABC GATES FOR EUROPE” IDAACS 2015

Summary 1. Introduction to biometrics 2. Computational intelligence for biometrics 3. Applications and examples Computational intelligence for sensors Computational intelligence for sensors Signal preprocessing Signal preprocessing Feature extraction and selection Feature extraction and selection Computational intelligence for data fusion Computational intelligence for data fusion Computational intelligence for classification and quality measurement Computational intelligence for classification and quality measurement Computational intelligence for system optimization Computational intelligence for system optimization 4. Conclusions © 2015 Vincenzo Piuri 2/48

Biometrics Biometrics “Automated methods of recognizing a person based on physiological or behavioral characteristics” Physiological biometrics Physiological biometrics Fingerprint, Face, Hand shape, Iris, Ear, DNA, Odor, … Fingerprint, Face, Hand shape, Iris, Ear, DNA, Odor, … Behavioral biometrics Behavioral biometrics Voice, Signature, Gait, Keystroke dynamics, … Voice, Signature, Gait, Keystroke dynamics, … © 2015 Vincenzo Piuri 3/48

Biometrics vs Classical Identification From something you have (token, key) or something you know (password) to something you are From something you have (token, key) or something you know (password) to something you are Identification method Security level Something you have Something you are Something you know © 2015 Vincenzo Piuri 4/48

Biometrics Systems (1) Dimension: from embedded to AFIS (FBI) Dimension: from embedded to AFIS (FBI) © 2015 Vincenzo Piuri 5/48

Biometrics Systems (2) Cooperative user or “hidden” system Cooperative user or “hidden” system Cooperative Hidden system © 2015 Vincenzo Piuri 6/48

Biometrics  Pattern Recognition Acquisition Feature extraction Database SampleFeatures Coding Template Acquisition Feature Extraction Coding Matching Trait Enrollment Identification Yes/No © 2015 Vincenzo Piuri 7 /48

Matching Score and Biometric Threshold Database Acquisition Feature Extraction Coding Matching Identification Yes/No >? Treshold = 87% Matching Score Low High © 2015 Vincenzo Piuri 8 /48

Impostor and Genuine Distributions False Match Rate (FMR) False Non-Match Rate (FNMR) © 2015 Vincenzo Piuri 9/48

Performance Representation The Receiving Operating Curve (FNMR vs FMR varying the threshold t) The Receiving Operating Curve (FNMR vs FMR varying the threshold t) is used to express the accuracy performance of the systems The equal error rate EER (FNMR=FMR) The equal error rate EER (FNMR=FMR) resume the performance of the system EER © 2015 Vincenzo Piuri 10/48

Technologies for Biometric Systems Sensors and measurement systems Sensors and measurement systems Biometric sensor, liveness tests Biometric sensor, liveness tests Signal processing Signal processing Feature extraction, liveness test Feature extraction, liveness test Image processing Image processing Face, fingerprint, hand, iris, gait, ear Face, fingerprint, hand, iris, gait, ear Sensor data fusion Sensor data fusion Matching module, multimodal biometric systems Matching module, multimodal biometric systems Classification and clustering Classification and clustering Organization of very-large DB of biomeric templates (National identification systems, large scale identification systems) Organization of very-large DB of biomeric templates (National identification systems, large scale identification systems) © 2015 Vincenzo Piuri 11/48

Conventional Algorithmic Techniques Computational complexity Require a model Not able to learn from experience © 2015 Vincenzo Piuri 12/48

Computational Intelligence for Biometrics Smarter Adaptive Evolvable Intelligent © 2015 Vincenzo Piuri 13/48

Composite Systems for Biometrics TRADITIONAL PARADIGMS + COMPUTATIONAL INTELLIGENCE = _________________________________ + MORE DESIGN DEGREES OF FREEDOM + ACCURACY + PERFORMACE Neural Network Fuzzy Algorithm Filter Designer Routine Input Output © 2015 Vincenzo Piuri 14/48

Main Problem Tackling different aspects at the same time: Instrumentation and measurement systems Instrumentation and measurement systems Image and signal processing. Image and signal processing. Feature extraction Feature extraction Sensor fusion Sensor fusion System modeling System modeling Data analysis Data analysis Classification Classification © 2015 Vincenzo Piuri 15/48

How to Deal with Heterogeneous Aspects? Nowadays: Separate issues Separate issues Module-oriented solutions Module-oriented solutions Ad-hoc solutions Ad-hoc solutions Limited optimization Limited optimization Limited reusability Limited reusability Limited integrability Limited integrability © 2015 Vincenzo Piuri 16/48

A Comprehensive Design Approach Feature Extraction Sensor Fusion System Modeling Data Analysis Classification Design methodology Biometric system © 2015 Vincenzo Piuri 17/48

Biometric system Design Methodology © 2015 Vincenzo Piuri 18/48

A. Signal and image acquisition B. Signal and image preprocessing C. Feature extraction and selection D. Data fusion E. Classification and quality measurement F. System optimization © 2015 Vincenzo Piuri 19/48

A. Signal and Image Acquisition Conventional techniques: Conventional techniques: Sensor enhancement Sensor enhancement Sensor linearization Sensor linearization Sensor diagnosis Sensor diagnosis Sensor calibration Sensor calibration Computational intelligence approaches Computational intelligence approaches Self-calibration Self-calibration Non-linearity reduction Non-linearity reduction Error and faults detection Error and faults detection © 2015 Vincenzo Piuri 20/48

B. Signal Preprocessing Signal preprocessing: enhancing the signals and correcting the errors Signal preprocessing: enhancing the signals and correcting the errors Features processing: extract from the input signals a set of features Features processing: extract from the input signals a set of features Neural and fuzzy techniques for signal and feature processing: for signal and feature processing: Adaptivity, intelligence, learning from examples,... Adaptivity, intelligence, learning from examples,... © 2015 Vincenzo Piuri 21/48

C. Feature Extraction and Selectiton How many features? How many features? ComplexityAccuracy Few features  Many features       ?!? © 2015 Vincenzo Piuri 22/48

Curse of Dimensionality Problem Due to an excessive number of features Due to an excessive number of features d=2 Space occupation= 10% d=3 Space occupation= 1% © 2015 Vincenzo Piuri 23/48

Dimensionality reduction problem Simplification of the classifier Faster Faster Use less memory Use less memory © 2015 Vincenzo Piuri 24/48

Selection or Extraction Feature selection: Feature selection: Feature extraction: Feature extraction: Feature 1 Feature 2 Feature 3 Feature 4 Feature 5 Feature 6 Feature Selection Feature 2 Feature 3 Feature 5 Feature 1 Feature 2 Feature 3 Feature 4 Feature 5 Feature 6 Feature Extraction Feature A Feature B Feature C Feature D © 2015 Vincenzo Piuri 25/48

Selection and Extraction Feature 1 Feature 2 Feature 3 Feature 4 Feature 5 Feature 6 Feature A Feature B Feature C Feature D Feature A Feature C Feature Selection Feature Extraction © 2015 Vincenzo Piuri 26/48

Feature Extraction Algorithms  Principal Component Analysis  Linear Discriminant Analysis  Independent Component Analysis  Kernel PCA  PCA network  Nonlinear PCA  Feed-Forward Neural Networks  Nonlinear autoassociative network  Multidimensional Scaling  Self-Organizing Map (MAP) © 2015 Vincenzo Piuri 27/48

Feature Selection Algorithms  Exhaustive Search  Branch and Bound  Sequential Forward Selection  Sequential Backward Selection  Sequential Floating Search methods © 2015 Vincenzo Piuri 28/48

D. Biometric Data Fusion © 2015 Vincenzo Piuri 29/48

Classical Fusion Schema Match score fusion Multi-paradigmatic Multimodal Features fusion © 2015 Vincenzo Piuri 30/48

Information Fusion Levels FM: Fusion Module DM: Decision Module MM: Matching Module © 2015 Vincenzo Piuri 31/48

Matching Fusion Level (Results) © 2015 Vincenzo Piuri 32/48

E. Computational Intelligence for Classification and Measurement Features α β γ... d-dimensional vector Classifier an integer: classification of the quality a floating point value: an index of quality © 2015 Vincenzo Piuri 33/48

Classification (Quality Checker and Binning) Acquisition Module Feature Extraction Module Template Traits Quality Checker Samples DX “arch” SX “arch” DX “loop” SX “arch” DX “arch” SX “loop” DX “loop” SX “loop” Classifier #1 Enrollment  Quality checker of input samples  Sub-class classification © 2015 Vincenzo Piuri 34/48

Computational Intelligence for Classification and Measurement (2) © 2015 Vincenzo Piuri 35/48

Computational Intelligence Techiniques Statistical Approaches Neural Networks Fuzzy Classifiers Solve complex problems by mimicking the human reasoning © 2015 Vincenzo Piuri 36/48

F. System Optimization System parameters difficult to fix System parameters difficult to fix Very often trial-and-error approaches Very often trial-and-error approaches Evolutionary computation techniques can solve this optimization task Evolutionary computation techniques can solve this optimization task © 2015 Vincenzo Piuri 37/48

State of the Art The conventional approach: trial and error The conventional approach: trial and error © 2015 Vincenzo Piuri 38/48

Design Methodology Goals Applying the high-level system design knowledge for the semi-automatic design of biometric systems. Applying the high-level system design knowledge for the semi-automatic design of biometric systems. The choice of algorithms to be inserted into the biometric system The choice of algorithms to be inserted into the biometric system The optimization of the hardware system architecture The optimization of the hardware system architecture The output produced is: Ready-to-compile code Ready-to-compile code Suitable configuration of the hardware architecture. Suitable configuration of the hardware architecture. © 2015 Vincenzo Piuri 39/48

What is the High-Level System Design? High-level synthesis is the process of mapping a behavioural description at the algorithmic level to a structural description in terms of functional units, memory elements, and interconnections High-level synthesis is the process of mapping a behavioural description at the algorithmic level to a structural description in terms of functional units, memory elements, and interconnections The term behavioural description refers to a description of the input/output relationship of the system to be implemented. The term behavioural description refers to a description of the input/output relationship of the system to be implemented. (algorithm written, e.g., in C, C++, VHDL, and System C) (algorithm written, e.g., in C, C++, VHDL, and System C) © 2015 Vincenzo Piuri 40/48

Methodolgy (1)  (2)  (3) The proposed methodology can be summarized in the three following main activities: The proposed methodology can be summarized in the three following main activities: (1)To model the possible hardware architectures (2)To specify the behavioural description of the biometric system for the envisioned application (3)To map the behavioural description for the specific application into a hardware model satisfying the designer’s requirement © 2015 Vincenzo Piuri 41/48

Hardware Architecture Model (1) © 2015 Vincenzo Piuri 42/48

Behavioural Description (2) The behavioural description of the biometric system consists of the sequence of the operations that allow the biometric system to identify the person presented at its input sensors. © 2015 Vincenzo Piuri 43/48

Mapping the Behavioural Description onto the Hardware Model (3) The goal of the mapping phase consists of binding each component of the behavioural description, A, to the corresponding hardware resources, HW, which implement its computation in the biometric system. The goal of the mapping phase consists of binding each component of the behavioural description, A, to the corresponding hardware resources, HW, which implement its computation in the biometric system. The optimum mapping is an iterative process in which proper figures of merit are evaluated and in which system’s independent variables are tuned to enhance the system’s figures of merit while satisfying the design requirements. The optimum mapping is an iterative process in which proper figures of merit are evaluated and in which system’s independent variables are tuned to enhance the system’s figures of merit while satisfying the design requirements. © 2015 Vincenzo Piuri 44/48

Figures of Merit for a Multimodal Biometric System The most common figures of merit considered for a biometric system The most common figures of merit considered for a biometric system characterize its accuracy Indexes used: Indexes used: The False Match Rate (FMR) The False Match Rate (FMR) The False Non-Match Rate (FNMR) The False Non-Match Rate (FNMR) The Equal Error Rate (EER) The Equal Error Rate (EER) Error plots: Error plots: Receiving Operating Curve (ROC) Receiving Operating Curve (ROC) Detection Error Trade-off (DET) Detection Error Trade-off (DET) Other figures of merit : Other figures of merit : Response time [s] Response time [s] Memory usage [MB] Memory usage [MB] Component costs[$] Component costs[$] © 2015 Vincenzo Piuri 45/48

Figures and Design Requirements Given the biometric model bio = HW(A) and the data benchData required to test the system, it is possible to evaluate the figures of merit with: Given the biometric model bio = HW(A) and the data benchData required to test the system, it is possible to evaluate the figures of merit with: The design requirements are expressed by the designer as a set of equations in the figures of merit: The design requirements are expressed by the designer as a set of equations in the figures of merit: Example of design requirements: Example of design requirements: © 2015 Vincenzo Piuri 46/48

Experimental Results To verify the feasibility and the usability of the proposed methodology, To verify the feasibility and the usability of the proposed methodology, we implemented a prototype of the methodology EER, zeroFMR, zeroFNMR. Matlab Rule-based system © 2015 Vincenzo Piuri 47/48

Conclusions Biometric systems are critical for security Biometric systems are critical for security Aspects in different technological areas should be tackled at the same time Aspects in different technological areas should be tackled at the same time A comprehensive design methodology should deal with all aspects in an integrated way A comprehensive design methodology should deal with all aspects in an integrated way Computational intelligence offer additional opportunities for adaptable and evolvable systems Computational intelligence offer additional opportunities for adaptable and evolvable systems © 2015 Vincenzo Piuri 48/48

References (1) A. Genovese, V. Piuri, F. Scotti Touchless Palmprint Recognition Systems Springer ISBN: R. Donida Labati, V. Piuri, F. Scotti Touchless Fingerprint Biometrics CRC Press ISBN: A. Amato, V. Di Lecce, V. Piuri Semantic Analysis and Understanding of Human Behavior in Video Streaming Springer ISBN: © 2015 Vincenzo Piuri

References (2) Introduction Introduction S. Z. Li, A. K. Jain, Encyclopedia of Biometrics, Springer Publishing Company, Incorporated, S. Z. Li, A. K. Jain, Encyclopedia of Biometrics, Springer Publishing Company, Incorporated, M. Tistarelli, S. Z. Li, R. Chellappa, Handbook of Remote Biometrics: For Surveillance and Securit,Springer Publishing Company, Incorporated, M. Tistarelli, S. Z. Li, R. Chellappa, Handbook of Remote Biometrics: For Surveillance and Securit,Springer Publishing Company, Incorporated, N. V. Boulgouris, K. N. Plataniotis, E. Micheli-Tzanakou, Biometrics: Theory, Methods, and Applications, IEEE Computer Society Press, N. V. Boulgouris, K. N. Plataniotis, E. Micheli-Tzanakou, Biometrics: Theory, Methods, and Applications, IEEE Computer Society Press, A. K. Jain, P. Flynn, A. Ross, Handbook of Biometrics, Springer-Verlag New York, Incorporated, A. K. Jain, P. Flynn, A. Ross, Handbook of Biometrics, Springer-Verlag New York, Incorporated, © 2015 Vincenzo Piuri

References (3) Fingerprint Fingerprint D. Maltoni, D. Maio, A. K. Jain, S. Prabhakar, Handbook of Fingerprint Recognition, 2nd ed., Springer Publishing Company, Incorporated, D. Maltoni, D. Maio, A. K. Jain, S. Prabhakar, Handbook of Fingerprint Recognition, 2nd ed., Springer Publishing Company, Incorporated, D. Maltoni, "Fingerprint Recognition, Overview", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing Company, Incorporated, pp. 510 – 513, D. Maltoni, "Fingerprint Recognition, Overview", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing Company, Incorporated, pp. 510 – 513, R. Donida Labati, A. Genovese, V. Piuri, F. Scotti, "Toward Unconstrained Fingerprint Recognition: a Fully- Touchless 3-D System Based on Two Views on the Move", in IEEE Transactions on Systems, Man, and Cybernetics: Systems, R. Donida Labati, A. Genovese, V. Piuri, F. Scotti, "Toward Unconstrained Fingerprint Recognition: a Fully- Touchless 3-D System Based on Two Views on the Move", in IEEE Transactions on Systems, Man, and Cybernetics: Systems, V. Piuri, and F. Scotti, "Fingerprint Biometrics via Low-cost Sensors and Webcams", in Biometrics: Theory, Applications and Systems, BTAS nd IEEE International Conference on, pp. 1-6, October V. Piuri, and F. Scotti, "Fingerprint Biometrics via Low-cost Sensors and Webcams", in Biometrics: Theory, Applications and Systems, BTAS nd IEEE International Conference on, pp. 1-6, October R. Donida Labati, A. Genovese, V. Piuri, F. Scotti, "Touchless fingerprint biometrics: a survey on 2D and 3D technologies", in Journal of Internet Technology, pp , May, R. Donida Labati, A. Genovese, V. Piuri, F. Scotti, "Touchless fingerprint biometrics: a survey on 2D and 3D technologies", in Journal of Internet Technology, pp , May, N. Yager, A. Amin, "Fingerprint verification based on minutiae features: a review", Pattern Analysis & Applications, Springer London, vol. 7, pp , N. Yager, A. Amin, "Fingerprint verification based on minutiae features: a review", Pattern Analysis & Applications, Springer London, vol. 7, pp , P. Komarinski, Automated fingerprint identification systems (AFIS), Elsevier Academic, Amsterdam, P. Komarinski, Automated fingerprint identification systems (AFIS), Elsevier Academic, Amsterdam, N.K. Ratha, R.M. Bolle, Automatic Fingerprint Recognition Systems, Springer-Verlag, N.K. Ratha, R.M. Bolle, Automatic Fingerprint Recognition Systems, Springer-Verlag, R. Donida Labati, V. Piuri, and F. Scotti, "A neural-based minutiae pair identification method for touchless fingerprint images", in IEEE Symposium Series in Computational Intelligence 2011 (SSCI 2011), April R. Donida Labati, V. Piuri, and F. Scotti, "A neural-based minutiae pair identification method for touchless fingerprint images", in IEEE Symposium Series in Computational Intelligence 2011 (SSCI 2011), April R. Donida Labati, A. Genovese, V. Piuri, F. Scotti, "Touchless Fingerprint Biometrics: a Survey on 2D and 3D Technologies", in Journal of Internet Technology, 2014 R. Donida Labati, A. Genovese, V. Piuri, F. Scotti, "Touchless Fingerprint Biometrics: a Survey on 2D and 3D Technologies", in Journal of Internet Technology, 2014 R. Donida Labati, A. Genovese, V. Piuri, F. Scotti, "Accurate 3D Fingerprint Virtual Environment for Biometric Technology Evaluations and Experiment Design", in Proc. of the 2013 IEEE Int. Conf. on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA 2013), Milan, Italy, pp , July , 2013 R. Donida Labati, A. Genovese, V. Piuri, F. Scotti, "Accurate 3D Fingerprint Virtual Environment for Biometric Technology Evaluations and Experiment Design", in Proc. of the 2013 IEEE Int. Conf. on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA 2013), Milan, Italy, pp , July , 2013 © 2015 Vincenzo Piuri

References (4) Fingerprint (cont’d) Fingerprint (cont’d) R. Donida Labati, A. Genovese, V. Piuri, F. Scotti, "Contactless Fingerprint Recognition: a Neural Approach for Perspective and Rotation Effects Reduction", in Proc. of the IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM), Singapore, Singapore, pp , April , 2013 R. Donida Labati, A. Genovese, V. Piuri, F. Scotti, "Contactless Fingerprint Recognition: a Neural Approach for Perspective and Rotation Effects Reduction", in Proc. of the IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM), Singapore, Singapore, pp , April , 2013 R. Donida Labati, V. Piuri, F. Scotti, "Measurement of the principal singular point in fingerprint images: a neural approach", in 2010 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA), pp , September 6-8, R. Donida Labati, V. Piuri, F. Scotti, "Measurement of the principal singular point in fingerprint images: a neural approach", in 2010 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA), pp , September 6-8, R. Donida Labati, V. Piuri, F. Scotti, "Neural-based Quality Measurement of Fingerprint Images in Contactless Biometric Systems", in The 2010 International Joint Conference on Neural Networks (IJCNN), pp. 1 – 8, July 18-23, R. Donida Labati, V. Piuri, F. Scotti, "Neural-based Quality Measurement of Fingerprint Images in Contactless Biometric Systems", in The 2010 International Joint Conference on Neural Networks (IJCNN), pp. 1 – 8, July 18-23, M. Gamassi, V. Piuri, and F. Scotti, "Fingerprint local analysis for high-performance minutiae extraction", in IEEE International Conference on Image Processing, 2005 (ICIP 2005), pp. III , September, 2005 M. Gamassi, V. Piuri, and F. Scotti, "Fingerprint local analysis for high-performance minutiae extraction", in IEEE International Conference on Image Processing, 2005 (ICIP 2005), pp. III , September, 2005 R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, "Two-view Contactless Fingerprint Acquisition Systems: a Case Study for Clay Artworks", in 2012 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications, 2012 R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, "Two-view Contactless Fingerprint Acquisition Systems: a Case Study for Clay Artworks", in 2012 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications, 2012 R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, "Virtual Environment for 3-D Synthetic Fingerprints", 2012 IEEE International Conference on Virtual Environments, Human-Computer Interfaces and Measurement Systems, pp , 2012 R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, "Virtual Environment for 3-D Synthetic Fingerprints", 2012 IEEE International Conference on Virtual Environments, Human-Computer Interfaces and Measurement Systems, pp , 2012 R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, "Quality Measurement of Unwrapped Three- dimensional Fingerprints: a Neural Networks Approach", in 2012 International Joint Conference on Neural Networks (IJCNN 2012), pp , 2012 R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, "Quality Measurement of Unwrapped Three- dimensional Fingerprints: a Neural Networks Approach", in 2012 International Joint Conference on Neural Networks (IJCNN 2012), pp , 2012 R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, "Fast 3-D Fingertip Reconstruction Using a Single Two-View Structured Light Acquisition", in IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications, pp , 2011 R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, "Fast 3-D Fingertip Reconstruction Using a Single Two-View Structured Light Acquisition", in IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications, pp , 2011 © 2015 Vincenzo Piuri

References (5) Fingerprint (cont’d) Fingerprint (cont’d) R. Donida Labati, V. Piuri, and F. Scotti, "A neural-based minutiae pair identification method for touchless fingeprint images", in 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM), pp , April, 2011 R. Donida Labati, V. Piuri, and F. Scotti, "A neural-based minutiae pair identification method for touchless fingeprint images", in 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM), pp , April, 2011 R. Donida Labati, V. Piuri, and F. Scotti, "Neural-based Quality Measurement of Fingerprint Images in Contactless Biometric Systems", in The 2010 International Joint Conference on Neural Networks (IJCNN), pp , July 18-23, 2010 R. Donida Labati, V. Piuri, and F. Scotti, "Neural-based Quality Measurement of Fingerprint Images in Contactless Biometric Systems", in The 2010 International Joint Conference on Neural Networks (IJCNN), pp , July 18-23, 2010 R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, "Measurement of the Principal Singular Point in Contact and Contactless Fingerprint Images by using Computational Intelligence Techniques", in 2010 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA 2010), pp , 2010 R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, "Measurement of the Principal Singular Point in Contact and Contactless Fingerprint Images by using Computational Intelligence Techniques", in 2010 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA 2010), pp , 2010 © 2015 Vincenzo Piuri

References (6) Iris Iris R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, "Iris segmentation: state of the art and innovative methods", in Cross Disciplinary Biometric Systems, C. Liu, and V.K. Mago (eds.), Springer, pp , 2012 R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, "Iris segmentation: state of the art and innovative methods", in Cross Disciplinary Biometric Systems, C. Liu, and V.K. Mago (eds.), Springer, pp , 2012 H. Proença, "Quality Assessment of Degraded Iris Images Acquired in the Visible Wavelength", IEEE Transactions on Information Forensics and Security,vol.6, no.1, pp.82-95, March H. Proença, "Quality Assessment of Degraded Iris Images Acquired in the Visible Wavelength", IEEE Transactions on Information Forensics and Security,vol.6, no.1, pp.82-95, March Yung-hui Li, M. Savvides,"Iris Recognition, Overview", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing Company, Incorporated, pp. 810 – 819, Yung-hui Li, M. Savvides,"Iris Recognition, Overview", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing Company, Incorporated, pp. 810 – 819, K.W. Bowyer, K. Hollingsworth and P.J. Flynn, Image understanding for iris biometrics: a survey, Computer Vision and Image Understanding, vol. 110, pp , K.W. Bowyer, K. Hollingsworth and P.J. Flynn, Image understanding for iris biometrics: a survey, Computer Vision and Image Understanding, vol. 110, pp , J. Daugman, "New Methods in Iris Recognition", IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, vol.37, no.5, pp , October J. Daugman, "New Methods in Iris Recognition", IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, vol.37, no.5, pp , October V. Piuri, and F. Scotti, "Adaptive Reflection Detection and Location in Iris Biometric Images by Using Computational Intelligence Techniques", in IEEE Transactions of Instrumentation and Measurement, pp , July V. Piuri, and F. Scotti, "Adaptive Reflection Detection and Location in Iris Biometric Images by Using Computational Intelligence Techniques", in IEEE Transactions of Instrumentation and Measurement, pp , July R. Donida Labati, and F. Scotti, "Noisy iris segmentation with boundary regularization and reflections removal", in Image and Vision Computing, Iris Images Segmentation Special Issue, Elsevier, pp , February R. Donida Labati, and F. Scotti, "Noisy iris segmentation with boundary regularization and reflections removal", in Image and Vision Computing, Iris Images Segmentation Special Issue, Elsevier, pp , February R. Donida Labati, V. Piuri, and F. Scotti, "Neural-based Iterative Approach for Iris Detection in Iris recognition systems", in IEEE Symposium on Computational Intelligence for Security and Defence Applications, pp. 1-6, December 18, R. Donida Labati, V. Piuri, and F. Scotti, "Neural-based Iterative Approach for Iris Detection in Iris recognition systems", in IEEE Symposium on Computational Intelligence for Security and Defence Applications, pp. 1-6, December 18, R. Donida Labati, V. Piuri, and F. Scotti, "Agent-Based Image Iris Segmentation and Multiple Views Boundary Refining", in IEEE Third International Conference on Biometrics: Theory, Applications and Systems, pp. 1-7, November 20, R. Donida Labati, V. Piuri, and F. Scotti, "Agent-Based Image Iris Segmentation and Multiple Views Boundary Refining", in IEEE Third International Conference on Biometrics: Theory, Applications and Systems, pp. 1-7, November 20, © 2015 Vincenzo Piuri

References (7) Face Face Yun Fu, Guodong Guo, T. S. Huang, "Age Synthesis and Estimation via Faces: A Survey", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.32, no.11, pp , November Yun Fu, Guodong Guo, T. S. Huang, "Age Synthesis and Estimation via Faces: A Survey", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.32, no.11, pp , November A. M. Martinez, "Face Recognition, Overview", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing Company, Incorporated, pp. 555 – 559, A. M. Martinez, "Face Recognition, Overview", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing Company, Incorporated, pp. 555 – 559, S. Romdhani, J. Ho, T. Vetter, D. J. Kriegman, "Face Recognition Using 3-D Models: Pose and Illumination", Proceedings of the IEEE, vol.94, no.11, pp , November S. Romdhani, J. Ho, T. Vetter, D. J. Kriegman, "Face Recognition Using 3-D Models: Pose and Illumination", Proceedings of the IEEE, vol.94, no.11, pp , November Z. Li, A. K. Jain, Handbook of Face Recognition, Springer-Verlag, Z. Li, A. K. Jain, Handbook of Face Recognition, Springer-Verlag, W. Zhao, R. Chellappa, A. Rosenfeld, P.J. Phillips, "Face Recognition: A Literature Survey", ACM Computing Surveys, pp S, W. Zhao, R. Chellappa, A. Rosenfeld, P.J. Phillips, "Face Recognition: A Literature Survey", ACM Computing Surveys, pp S, S. S. Rakover & B. Cahlon, Face recognition: cognitive and computational processes, John Benjamins Publishing Co., Amsterdam, The Netherlands, S. S. Rakover & B. Cahlon, Face recognition: cognitive and computational processes, John Benjamins Publishing Co., Amsterdam, The Netherlands, Ear shape Ear shape M. Choras, "Ear Biometrics", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing Company, Incorporated, pp. 233 – 240, M. Choras, "Ear Biometrics", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing Company, Incorporated, pp. 233 – 240, B. Bhanu, H. Chen, Human Ear Recognition by Computer (Advances in Pattern Recognition), Springer Publishing Company, Incorporated, B. Bhanu, H. Chen, Human Ear Recognition by Computer (Advances in Pattern Recognition), Springer Publishing Company, Incorporated, D. J. Hurley, B. Arbab-Zavar, M. S. Nixon, “The Ear as a Biometric”, in: Handbook of Biometrics, pp A. K. Jain, P. Flynn, A. Ross, Springer-Verlag New York, Incorporated, D. J. Hurley, B. Arbab-Zavar, M. S. Nixon, “The Ear as a Biometric”, in: Handbook of Biometrics, pp A. K. Jain, P. Flynn, A. Ross, Springer-Verlag New York, Incorporated, S. M. S. Islam, M. Bennamoun, R. A. Owens, R. Davies, "Biometric Approaches of 2D-3D Ear and Face: A Survey", in Advances in Computer and Information Sciences and Engineering. Springer Netherlands, pp , S. M. S. Islam, M. Bennamoun, R. A. Owens, R. Davies, "Biometric Approaches of 2D-3D Ear and Face: A Survey", in Advances in Computer and Information Sciences and Engineering. Springer Netherlands, pp , © 2015 Vincenzo Piuri

References (8) Hand geometry Hand geometry N. Duta, "A survey of biometric technology based on hand shape", Pattern Recognition, vol. 42, n. 11, pp , November N. Duta, "A survey of biometric technology based on hand shape", Pattern Recognition, vol. 42, n. 11, pp , November N. Duta, "Hand Shape", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing Company, Incorporated, pp. 682 – 687, N. Duta, "Hand Shape", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing Company, Incorporated, pp. 682 – 687, R. Sanchez-Reillo, C. Sanchez-Avila, A. Gonzalez-Marcos, "Biometric identification through hand geometry measurements," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.22, no.10, pp , October R. Sanchez-Reillo, C. Sanchez-Avila, A. Gonzalez-Marcos, "Biometric identification through hand geometry measurements," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.22, no.10, pp , October Palmprint & Palmvein Palmprint & Palmvein D. Zhang, Z. Guo, G. Lu, L. Zhang, Y. Liu, W. Zuo, "Online joint palmprint and palmvein verification", Expert Systems with Applications, vol. 38, no. 3, pp , March D. Zhang, Z. Guo, G. Lu, L. Zhang, Y. Liu, W. Zuo, "Online joint palmprint and palmvein verification", Expert Systems with Applications, vol. 38, no. 3, pp , March A. Kong, D. Zhang, M. Kamel, "A Survey of Palmprint Recognition", Pattern Recognition, vol. 42, no. 7, pp , July A. Kong, D. Zhang, M. Kamel, "A Survey of Palmprint Recognition", Pattern Recognition, vol. 42, no. 7, pp , July M. Watanabe, " Palm Vein", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing Company, Incorporated, pp – 1033, M. Watanabe, " Palm Vein", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing Company, Incorporated, pp – 1033, D. Zhang, V. Kanhangad, "Palmprint, 3D", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing Company, Incorporated, pp – 1042, D. Zhang, V. Kanhangad, "Palmprint, 3D", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing Company, Incorporated, pp – 1042, ECG ECG R. Donida Labati, V. Piuri, R. Sassi, G. Sforza, F. Scotti, "Adaptive ECG biometric recognition: a study on re-enrollment methods for QRS signals", in Proc. of the IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM 2014), Orlando, FL, USA, pp , December 9-12, R. Donida Labati, V. Piuri, R. Sassi, G. Sforza, F. Scotti, "Adaptive ECG biometric recognition: a study on re-enrollment methods for QRS signals", in Proc. of the IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM 2014), Orlando, FL, USA, pp , December 9-12, R. Donida Labati, V. Piuri, R. Sassi and F. Scotti, "HeartCode: a novel binary ECG-based template", in Proc. of the IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS 2014), Rome, Italy, October 17, R. Donida Labati, V. Piuri, R. Sassi and F. Scotti, "HeartCode: a novel binary ECG-based template", in Proc. of the IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS 2014), Rome, Italy, October 17, © 2015 Vincenzo Piuri

References (9) DNA DNA J.M. Butler, Fundamentals of Forensic DNA Typing, Elsevier Academic Press, San Diego, J.M. Butler, Fundamentals of Forensic DNA Typing, Elsevier Academic Press, San Diego, R.A.H. van Oorschot, K. N. Ballantyne, R. J. Mitchell, "Forensic trace DNA: a review", Investigative Genetics, pp. 1 – 14, R.A.H. van Oorschot, K. N. Ballantyne, R. J. Mitchell, "Forensic trace DNA: a review", Investigative Genetics, pp. 1 – 14, T. Hicks, R. Coquoz, " Forensic DNA Evidence", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing Company, Incorporated, pp. 573 – 579, T. Hicks, R. Coquoz, " Forensic DNA Evidence", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing Company, Incorporated, pp. 573 – 579, P. M. Vallone, C. R. Hill, J. M. Butler, "Demonstration of rapid multiplex PCR amplification involving 16 genetic loci", Forensic Science International: Genetics, vol. 3, no. 1, pp , December P. M. Vallone, C. R. Hill, J. M. Butler, "Demonstration of rapid multiplex PCR amplification involving 16 genetic loci", Forensic Science International: Genetics, vol. 3, no. 1, pp , December © 2015 Vincenzo Piuri

References (10) Voice Voice H. Beigi, Fundamentals of Speaker Recognition, Springer-Verlag New York Inc., January H. Beigi, Fundamentals of Speaker Recognition, Springer-Verlag New York Inc., January J. Markowitz, "Speaker Recognition, Standardization", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing Company, Incorporated, pp – 1277, J. Markowitz, "Speaker Recognition, Standardization", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing Company, Incorporated, pp – 1277, J. Benesty, M. Mohan Sondhi, Y. Huang, Springer Handbook of Speech Processing, Springer-Verlag, January J. Benesty, M. Mohan Sondhi, Y. Huang, Springer Handbook of Speech Processing, Springer-Verlag, January R. D. Peacocke, D. H. Graf, "An introduction to speech and speaker recognition", Computer, vol.23, no.8, pp.26-33, August R. D. Peacocke, D. H. Graf, "An introduction to speech and speaker recognition", Computer, vol.23, no.8, pp.26-33, August Gait Gait M. Goffredo, I. Bouchrika, J. N. Carter, M. S. Nixon, "Self-Calibrating View-Invariant Gait Biometrics", IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, vol.40, no.4, pp , August M. Goffredo, I. Bouchrika, J. N. Carter, M. S. Nixon, "Self-Calibrating View-Invariant Gait Biometrics", IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, vol.40, no.4, pp , August R. Chellappa, A. Veeraraghavan, N. Ramanathan, "Gait Biometrics, Overview", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing Company, Incorporated, pp. 628 – 633, R. Chellappa, A. Veeraraghavan, N. Ramanathan, "Gait Biometrics, Overview", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing Company, Incorporated, pp. 628 – 633, M.S. Nixon, J. N. Carter, "Automatic Recognition by Gait," Proceedings of the IEEE, vol.94, no.11, pp , November M.S. Nixon, J. N. Carter, "Automatic Recognition by Gait," Proceedings of the IEEE, vol.94, no.11, pp , November N.V. Boulgouris, D. Hatzinakos, K.N. Plataniotis, "Gait recognition: a challenging signal processing technology for biometric identification", IEEE Signal Processing Magazine, vol.22, no.6, pp , November N.V. Boulgouris, D. Hatzinakos, K.N. Plataniotis, "Gait recognition: a challenging signal processing technology for biometric identification", IEEE Signal Processing Magazine, vol.22, no.6, pp , November © 2015 Vincenzo Piuri

References (11) Signature & hand writing Signature & hand writing V. A. Bharadi, H. B. Kekre, "Off-Line Signature Recognition Systems", International Journal of Computer Applications vol. 1, no. 27, pp. 48–56, February V. A. Bharadi, H. B. Kekre, "Off-Line Signature Recognition Systems", International Journal of Computer Applications vol. 1, no. 27, pp. 48–56, February O. Henniger, D. Muramatsu, T. Matsumoto, I. Yoshimura, M. Yoshimura, " Signature Recognition", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing Company, Incorporated, pp – 1205, O. Henniger, D. Muramatsu, T. Matsumoto, I. Yoshimura, M. Yoshimura, " Signature Recognition", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing Company, Incorporated, pp – 1205, D. Impedovo, G. Pirlo, "Automatic Signature Verification: The State of the Art", IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, vol.38, no.5, pp , September D. Impedovo, G. Pirlo, "Automatic Signature Verification: The State of the Art", IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, vol.38, no.5, pp , September Keystroke Keystroke N. Bartlow, "Keystroke Recognition", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing Company, Incorporated, pp. 877 – 882, N. Bartlow, "Keystroke Recognition", in Encyclopedia of Biometrics. S. Z. Li and A. K. Jain, Springer Publishing Company, Incorporated, pp. 877 – 882, D. Shanmugapriya, "A survey of biometric keystroke dynamics: approaches, security and challenges", International Journal of Computer Science and Information Security, vol. 5, pp. 115 – 119, September D. Shanmugapriya, "A survey of biometric keystroke dynamics: approaches, security and challenges", International Journal of Computer Science and Information Security, vol. 5, pp. 115 – 119, September Enzhe Yu, Sungzoon Cho, "Keystroke dynamics identity verification - its problems and practical solutions", Computers & Security, vol. 23, no. 5, pp , July Enzhe Yu, Sungzoon Cho, "Keystroke dynamics identity verification - its problems and practical solutions", Computers & Security, vol. 23, no. 5, pp , July Weight Weight R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, "Weight Estimation from Frame Sequences Using Computational Intelligence Techniques", 2012 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA 2012), pp , 2012 R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti, "Weight Estimation from Frame Sequences Using Computational Intelligence Techniques", 2012 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA 2012), pp , 2012 © 2015 Vincenzo Piuri

References (12) Biometric Privacy Biometric Privacy M. Upmanyu, A. Namboodiri, K. Srinathan, and C. Jawahar, "Blind authentication: A secure crypto- biometric verification protocol", Information Forensics and Security, IEEE Transactions on, vol. 5, no. 2, pp. 255 –268, June2010. M. Upmanyu, A. Namboodiri, K. Srinathan, and C. Jawahar, "Blind authentication: A secure crypto- biometric verification protocol", Information Forensics and Security, IEEE Transactions on, vol. 5, no. 2, pp. 255 –268, June2010. J. Golic, M. Baltatu, “Entropy analysis and new constructions of biometric key generation systems,” IEEE Transactions on Information Theory, vol. 54, no. 5,pp. 2026–2040, J. Golic, M. Baltatu, “Entropy analysis and new constructions of biometric key generation systems,” IEEE Transactions on Information Theory, vol. 54, no. 5,pp. 2026–2040, A. K. Jain, K. Nandakumar, A. Nagar, "Biometric template security", EURASIP Journal on Advances Signal Processing, vol. 2008, pp. 1-17, A. K. Jain, K. Nandakumar, A. Nagar, "Biometric template security", EURASIP Journal on Advances Signal Processing, vol. 2008, pp. 1-17, Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data", SIAM Journal on Computing, vol. 38, no. 1, pp. 97–139, Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data", SIAM Journal on Computing, vol. 38, no. 1, pp. 97–139, N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, "Generating cancelable fingerprint templates", IEEE Transaction on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 561–572, N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, "Generating cancelable fingerprint templates", IEEE Transaction on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 561–572, A. Teoh, A. Goh, and D. Ngo, "Random multispace quantization as an analytic mechanism for bio- hashing of biometric and random identity inputs", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 28, no. 12, pp –1901, December A. Teoh, A. Goh, and D. Ngo, "Random multispace quantization as an analytic mechanism for bio- hashing of biometric and random identity inputs", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 28, no. 12, pp –1901, December M. Barni, T. Bianchi, D. Catalano, M. Di Raimondo, R. Donida Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, F. Scotti, and A. Piva, "A Privacy-compliant Fingerprint Recognition System Based on Homomorphic Encryption and Fingercode Templates", in 2010 Fourth IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS), pp. 1-7, September 27-29, M. Barni, T. Bianchi, D. Catalano, M. Di Raimondo, R. Donida Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, F. Scotti, and A. Piva, "A Privacy-compliant Fingerprint Recognition System Based on Homomorphic Encryption and Fingercode Templates", in 2010 Fourth IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS), pp. 1-7, September 27-29, © 2015 Vincenzo Piuri

References (13) Biometric Privacy (cont’s) Biometric Privacy (cont’s) M. Barni, T. Bianchi, D. Catalano, M. Di Raimondo, R. Donida Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, F. Scotti, and A. Piva, "Privacy-Preserving Fingercode Authentication", in Proceedings of the 12th ACM workshop on Multimedia and security, ACM, New York, NY, USA, pp , September 9-10, M. Barni, T. Bianchi, D. Catalano, M. Di Raimondo, R. Donida Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, F. Scotti, and A. Piva, "Privacy-Preserving Fingercode Authentication", in Proceedings of the 12th ACM workshop on Multimedia and security, ACM, New York, NY, USA, pp , September 9-10, T. Bianchi, R. Donida Labati, V. Piuri, A. Piva, F. Scotti, S. Turchi, "Implementing FingerCode-Based Identity Matching in the Encrypted Domain", in 2010 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS), pp , September 9, T. Bianchi, R. Donida Labati, V. Piuri, A. Piva, F. Scotti, S. Turchi, "Implementing FingerCode-Based Identity Matching in the Encrypted Domain", in 2010 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS), pp , September 9, S. Cimato, M. Gamassi, V. Piuri, R. Sassi, and F. Scotti, "Privacy in Biometrics", in Biometrics: Theory, Methods, and Applications, Wiley-IEEE Press, S. Cimato, M. Gamassi, V. Piuri, R. Sassi, and F. Scotti, "Privacy in Biometrics", in Biometrics: Theory, Methods, and Applications, Wiley-IEEE Press, S. Cimato, M. Gamassi, V. Piuri, R. Sassi, and F. Scotti, "Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System", in Annual Computer Security Applications Conference, ACSAC 2008, pp , December, 2008 S. Cimato, M. Gamassi, V. Piuri, R. Sassi, and F. Scotti, "Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System", in Annual Computer Security Applications Conference, ACSAC 2008, pp , December, 2008 S. Cimato, M. Gamassi, V. Piuri, R. Sassi, and F. Scotti, "A Multi-Biometric Verification System for the Privacy Protection of Iris Templates", in International Workshop on Computational Intelligence in Security for Information Systems, October 23-24, 2008 S. Cimato, M. Gamassi, V. Piuri, R. Sassi, and F. Scotti, "A Multi-Biometric Verification System for the Privacy Protection of Iris Templates", in International Workshop on Computational Intelligence in Security for Information Systems, October 23-24, 2008 S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Cimato, and F. Scotti, "A Biometric Verification System Addressing Privacy Concerns", in Computational Intelligence and Security, 2007 International Conference on, pp , December S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Cimato, and F. Scotti, "A Biometric Verification System Addressing Privacy Concerns", in Computational Intelligence and Security, 2007 International Conference on, pp , December S. Cimato, M. Gamassi, V. Piuri, D. Sana, R. Sassi, and F. Scotti, "Personal identification and verification using multimodal biometric data", in Proceedings of the 2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety, pp , October, 2006 S. Cimato, M. Gamassi, V. Piuri, D. Sana, R. Sassi, and F. Scotti, "Personal identification and verification using multimodal biometric data", in Proceedings of the 2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety, pp , October, 2006 © 2015 Vincenzo Piuri