Implementation of Fuzzy Vault biometric cryptosystem in Java
SpeechAuth: development of a biometric authentication and comand interpretation sy...
Impact of Short-Term Dysphonia on Biometric Voice Authentication
Side channel and invasive attacks on a secure code execution computer architecture
Deep neural networks and deep feature selection for spoofing detection in voice au...
Deep representations for iris, face, and fingerprint spoofing detection