Skip to main content
This article analyses the development of three EU migration databases and their significance for the internal control of irregular migrants. Because borders and immigration policy alone cannot stop irregular migration, many governments... more
    • by 
    •   9  
      European StudiesDatabase SystemsMigrationIrregular Migration
Global security concerns have raised a proliferation of video surveillance devices. Intelligent surveillance systems seek to discover possible threats automatically and raise alerts. Being able to identify the surveyed object can help... more
    • by 
    •   6  
      Computer VisionBiometricsMultimedia Indexing and SearchingBiometrics And Identity
    • by  and +1
    •   3  
      Information SecurityCryptographyBiometrics And Identity
    • by 
    •   2  
      Surveillance StudiesBiometrics And Identity
Through an ethnographic focus on Muslim neighbourhoods in a North Indian city, this article traces the effects of increasing digitisation of Public Distribution Systems (PDS) and ID provision in India by examining the implications for... more
    • by 
    •   19  
      Information TechnologyAnthropologyEthnographyBureaucracies & Bureaucratic Workers
Problems of marginalization and inclusion are central to HCI scholarship and impact in the world, but are badly named in the binary models of access that currently dominate the field. Building on prior work in ICTD and infrastructure... more
    • by 
    •   7  
      InclusionBiometrics And IdentityICTDIndia
In spite of over two decades of intense research, illumination and pose invariance remain prohibitively challenging aspects of face recognition for most practical applications. The objective of this work is to recognize faces using video... more
    • by 
    •   107  
      EngineeringElectrical EngineeringElectronic EngineeringApplied Mathematics
A recent trend in migration policy in Europe is the increased use of Information and Communication Technologies (ICTs) for border control purposes. A growing academic literature explains the digitisation of border controls as an instance... more
    • by  and +1
    •   9  
      Human GeographyBorder StudiesGovernanceICT
As a problem of high practical appeal but outstanding challenges, computer-based face recognition remains a topic of extensive research attention. In this paper we are specifically interested in the task of identifying a person from... more
    • by 
    •   14  
      Computer VisionImage ProcessingFace RecognitionFace Recognition (Engineering)
To date, little attention has been given to the impact of big data in the Global South, about 60% of whose residents are below the poverty line. Big data manifests in novel and unprecedented ways in these neglected contexts. For instance,... more
    • by 
    •   14  
      Digital DivideAfricaRural DevelopmentICT4D
As anticipated in True Names by Vernor Vinge, identity has been recognized as our most valued possession in cyberspace. Attribution is a key concept in enabling trusted identities and deterring malicious activities. As more people use the... more
    • by 
    •   3  
      Machine LearningData MiningBiometrics And Identity
Using the example of Eurodac the following contribution concentrates on the digitization of European border controls. Eurodac, an information, communication and control technology, operates by means of a European database, in which the... more
    • by  and +1
    •   2  
      Border StudiesBiometrics And Identity
The finger print recognition, face recognition, hand geometry, iris recognition, voice scan, signature, retina scan and several other biometric patterns are being used for recognition of an individual. Human footprint is one of the... more
    • by 
    •   4  
      Independent Component AnalysisBiometricsBiometrics And IdentityPrincipal component analysis (PCA)
Because borders alone cannot stop irregular migration, the European Union is turning more and more to internal control measures. Through surveillance, member states aim to exclude irregular migrants from societal institutions, thereby... more
    • by 
    •   16  
      CriminologyEuropean StudiesEconomicsIrregular Migration
In this paper we address the problem of matching sets of vectors embedded in the same input space. We propose an approach which is motivated by canonical correlation analysis (CCA), a statistical technique which has proven successful in a... more
    • by 
    •   99  
      EngineeringElectrical EngineeringProbability TheoryComputer Science
At various points in its existence, the Indian state has deployed technologies to govern the nation. Recently, the state has undertaken a number of large-scale projects to make use of digital technology. The most controversial of these is... more
    • by 
    •   11  
      Indian studiesGovernanceIdentity (Culture)Surveillance Studies
Achieving illumination invariance in the presence of large pose changes remains one of the most challenging aspects of automatic face recognition from low resolution imagery. In this paper, we propose a novel recognition methodology for... more
    • by 
    •   50  
      Information RetrievalComputer VisionImage ProcessingMachine Learning
In recent years, we have witnessed a rapid spread of biometric technologies from the security domain to commercial and social media applications. In this article, we critically explore the repercussions of this diffusion of face... more
    • by 
    •   2  
      Face RecognitionBiometrics And Identity
Iris is a powerful tool for reliable human identification. It has the potential to identify individuals with a high degree of assurance. Extracting good features is the most significant step in the iris recognition system. In the past,... more
    • by 
    •   15  
      Computer ScienceInformation TechnologyBiometricsImage Features Extraction
Purpose: This study aims to explore whether face recognition technology - as it is intensely employed by state and local police departments and law enforcement agencies - is racism-free or, on the contrary, is affected by racial biases... more
    • by  and +1
    •   10  
      Race and RacismFace RecognitionRace and EthnicityBiometrics
Fish identification is crucial for the survival of our threatened fish species. In this paper, a novel and robust biometric-based approach was proposed to identify fish species. The proposed approach consists of three phases. In the first... more
    • by 
    •   4  
      Machine LearningBiometricsFisheries ManagementBiometrics And Identity
Biometric templates are subject to modifications for identity fraud especially when they are stored in databases. In this paper, a new approach to protecting biometric templates with image watermarking techniques is proposed. The novelty... more
    • by 
    •   4  
      BiometricsCryptographyBiometrics And IdentityDigital Watermarking
The human species is again becoming nomadic. Each year, about two billion persons move across large geographic distances (not to mention people in "virtual mobility" through information and communication technology). Many of these people... more
    • by 
    •   12  
      EthicsGlobalizationPrivacyPolicy
Extant South Asian histories of race, and more specifically biometrics, focus almost exclusively upon the colonial era and especially the nineteenth century. Yet an increasing number of ethnographic accounts observe that Indian scientists... more
    • by 
    •   8  
      South Asian StudiesRace and EthnicityNationalismBiometrics And Identity
In this paper the design of recognition system for retinal images using neural network is considered. Retina based recognition is perceived as the most secure method for identification of an identity used to distinguish individuals. The... more
    • by 
    •   5  
      Neural NetworksBiometrics And IdentityMatlabArtificial Neural Networks
In this research, we investigated the performance of a continuous biometric authentication system for mobile devices under various different analysis techniques. We tested these on a publicly available swipe gestures database with 71... more
    • by  and +1
    •   3  
      BiometricsBiometrics And IdentityBehavioral Biometrics
Illumination and pose invariance are the most challenging aspects of face recognition. In this paper we describe a fully automatic face recognition system that uses video information to achieve illumination and pose robustness. In the... more
    • by 
    •   109  
      EngineeringElectrical EngineeringElectronic EngineeringApplied Mathematics
As a problem of high practical appeal but many outstanding challenges, computer-based face recognition remains a topic of extensive research attention. In this paper we are specifically interested in the task of identifying a person using... more
    • by 
    •   82  
      Computer ScienceRobotics (Computer Science)Computer VisionStatistics
Illumination invariance remains the most researched, yet the most challenging aspect of automatic face recognition. In this paper we propose a novel, general recognition framework for efficient matching of individual face images, sets or... more
    • by 
    •   106  
      EngineeringElectrical EngineeringElectronic EngineeringApplied Mathematics
In this paper we address the problem of matching patterns in the so-called verification setting in which a novel, query pattern is verified against a single training pattern: the decision sought is whether the two match (i.e. belong to... more
    • by 
    •   108  
      EngineeringApplied MathematicsComputer ScienceAlgorithms
In this paper, we demonstrate that gait patterns of an individual captured through a smartphone accelerometer can be imitated with the support of a digital treadmill. Furthermore, we design an attack for a baseline gait based... more
    • by 
    •   3  
      Gait BiomechanicsBiometrics And IdentityAuthentication
In this paper we consider face recognition from sets of face images and, in particular, recognition invariance to illumination. The main contribution is an algorithm based on the novel concept of Maximally Probable Mutual Modes (MMPM).... more
    • by 
    •   114  
      EngineeringApplied MathematicsComputer ScienceAlgorithms
—Most of the existing techniques for palmprint recognition are based on metrics that evaluate the distance between a pair of features. These metrics are typically based on static functions. In this paper we propose a new technique for... more
    • by 
    •   4  
      Dynamical SystemsImage ProcessingBiometricsBiometrics And Identity
Using the example of Eurodac our paper concentrates on the digitization of Europe-an border controls. Eurodac, an information, communication and control technolo-gy operates by means of a European database, in which the fingerprints of... more
    • by 
    •   4  
      European integrationBiometrics And IdentityMigration and Border StudiesSTS/ANT
This paper is set out to evaluate the performance of feature extraction techniques that can determine ethnicity of an individual using fingerprint biometric technique and deep learning approach. Hence, fingerprint images of one thousand... more
    • by  and +1
    •   4  
      Computer ScienceBiometrics And IdentityDeep LearningComputer Vision, Behaviour Modelling, Deep Learning
The automatic identification of person’s identity from their voice is a part of modern telecommunication services. In order to execute the identification task, speech signal has to be transmitted to a remote server. So a performance of... more
    • by 
    •   38  
      Telecommunications EngineeringComputer ScienceHuman Computer InteractionCommunication
The self-quotient image is a biologically inspired representation which has been proposed as an illumination invariant feature for automatic face recognition. Owing to the lack of strong domain specific assumptions underlying this... more
    • by 
    •   54  
      EngineeringApplied MathematicsComputer ScienceAlgorithms
Linear subspace representations of appearance variation are pervasive in computer vision. This paper addresses the problem of robustly matching such subspaces (computing the similarity between them) when they are used to describe the... more
    • by 
    •   86  
      EngineeringComputer ScienceAlgorithmsSoftware Engineering
    • by 
    •   2  
      BiometricsBiometrics And Identity
This paper discusses the methods of presentation and comparison of semantically unrelated images with an assessment of their similarity in original feature space, and in the Space of Canonical Variables (SCV). The projection of source... more
    • by  and +1
    •   2  
      Biometrics And IdentityDigital Image Processing
Optical coherence tomography (OCT) is a high-resolution imaging technology capable of capturing a three-dimensional (3-D) representation of fingertip skin. The papillary junction—a junction layer of skin containing the same topographical... more
    • by  and +1
    •   27  
      Computer VisionImage ProcessingInformation SecurityMachine Learning
Effective management of projects is increasingly becoming important for organisations to remain competitive in today's dynamic business environment. The use of benchmarking is widening as a technique for supporting project management.... more
    • by 
    •   5  
      Information TechnologyForest biometricsBiometrics And IdentityBiometrics - Iris Recognition
In the current scenario the way banking and transaction system is changing in the world, the validation, authentication and confirmation of a person is very important and should be of more concern. Authentication and verification has... more
    • by 
    •   5  
      SecurityBiometricsBiometrics And IdentityBiometric Security
    • by  and +1
    •   4  
      BiometricsBiometrics And IdentityBiometrics Authentication TechnologiesBehavioral Biometrics
Continuous Authentication by analysing the user's behaviour profile on the computer input devices is challenging due to limited information, variability of data and the sparse nature of the information. As a result, most of the previous... more
    • by  and +1
    •   2  
      BiometricsBiometrics And Identity
    • by 
    •   6  
      Digital Signal ProcessingBiometricsBiometrics And IdentityHuman Gait Analysis
This chapter uses the introduction of the Visa Information System (VIS), a vast biometric database, as an opportunity to compensate for the relative neglect of the European visa regime in border and migration studies. Inspired by the... more
    • by 
    •   5  
      Border StudiesMigration StudiesBiometrics And IdentitySchengen Visa policy
Biometrics is the automated method of recognizing a person based on a physiological or behavioural characteristic. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal... more
    • by 
    •   3  
      Biometrics And IdentityGUIData acquisition
The word biometrics refers to the use of physiological or biological characteristics of human to recognize and verify the identity of an individual. Face is one of the human biometrics for passive identification with uniqueness and... more
    • by 
    •   12  
      Artificial IntelligenceImage ProcessingMachine LearningData Mining