Javier Galbally

According to our database1, Javier Galbally authored at least 76 papers between 2007 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
General Framework to Evaluate Unlinkability in Biometric Template Protection Systems.
IEEE Trans. Information Forensics and Security, 2018

Benchmarking Touchscreen Biometrics for Mobile Authentication.
IEEE Trans. Information Forensics and Security, 2018

Multi-biometric template protection based on bloom filters.
Information Fusion, 2018

Fingerprint Quality: a Lifetime Story.
Proceedings of the 2018 International Conference of the Biometrics Special Interest Group, 2018

2017
A New Multimodal Approach for Password Strength Estimation - Part II: Experimental Evaluation.
IEEE Trans. Information Forensics and Security, 2017

A New Multimodal Approach for Password Strength Estimation - Part I: Theory and Algorithms.
IEEE Trans. Information Forensics and Security, 2017

Multi-biometric template protection based on Homomorphic Encryption.
Pattern Recognition, 2017

Privacy-Preserving Comparison of Variable-Length Data With Application to Biometric Template Protection.
IEEE Access, 2017

Exploring a statistical method for touchscreen swipe biometrics.
Proceedings of the International Carnahan Conference on Security Technology, 2017

Divide, recombine and conquer: Syntactic patterns-reassembly algorithm applied to password guessing process.
Proceedings of the International Carnahan Conference on Security Technology, 2017

Accuracy evaluation of handwritten signature verification: Rethinking the random-skilled forgeries dichotomy.
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017

Full 3D touchless fingerprint recognition: Sensor, database and baseline performance.
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017

2016
Graphical Password-Based User Authentication With Free-Form Doodles.
IEEE Trans. Human-Machine Systems, 2016

Unlinkable and irreversible biometric template protection based on bloom filters.
Inf. Sci., 2016

Three-dimensional and two-and-a-half-dimensional face recognition spoofing using three-dimensional printed models.
IET Biometrics, 2016

Keystroke Biometrics Ongoing Competition.
IEEE Access, 2016

Variable-length template protection based on homomorphic encryption with application to signature biometrics.
Proceedings of the 4th International Conference on Biometrics and Forensics, 2016

A review of iris anti-spoofing.
Proceedings of the 4th International Conference on Biometrics and Forensics, 2016

Biometric Sensor Interoperability: A Case Study in 3D Face Recognition.
Proceedings of the 5th International Conference on Pattern Recognition Applications and Methods, 2016

Implementation of Fixed-Length Template Protection Based on Homomorphic Encryption with Application to Signature Biometrics.
Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2016

2015
Anti-spoofing, Iris.
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015

Anti-spoofing, Iris Databases.
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015

Anti-spoofing, Fingerprint Databases.
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015

On-line signature recognition through the combination of real dynamic data and synthetically generated static data.
Pattern Recognition, 2015

Towards cancelable multi-biometrics based on bloom filters: a case study on feature level fusion of face and iris.
Proceedings of the 3rd International Workshop on Biometrics and Forensics, 2015

Enhanced on-line signature verification based on skilled forgery detection using Sigma-LogNormal Features.
Proceedings of the International Conference on Biometrics, 2015

2014
Fingerprint Anti-spoofing in Biometric Systems.
Proceedings of the Handbook of Biometric Anti-Spoofing, 2014

Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition.
IEEE Trans. Image Processing, 2014

Recent developments in the study of rapid human movements with the kinematic theory: Applications to handwriting and signature synthesis.
Pattern Recognition Letters, 2014

Efficient software attack to multimodal biometric systems and its application to face and iris fusion.
Pattern Recognition Letters, 2014

A novel hand reconstruction approach and its application to vulnerability assessment.
Inf. Sci., 2014

Mobile signature verification: feature robustness and performance comparison.
IET Biometrics, 2014

Biometric Antispoofing Methods: A Survey in Face Recognition.
IEEE Access, 2014

Biografo: An Integrated Tool for Forensic Writer Identification.
Proceedings of the Computational Forensics, 2014

Children Gender Recognition Under Unconstrained Conditions Based on Contextual Information.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

Protected Facial Biometric Templates Based on Local Gabor Patterns and Adaptive Bloom Filters.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

Face Anti-spoofing Based on General Image Quality Assessment.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

Generation of Enhanced Synthetic Off-Line Signatures Based on Real On-Line Data.
Proceedings of the 14th International Conference on Frontiers in Handwriting Recognition, 2014

A probabilistic framework for improved password strength metrics.
Proceedings of the International Carnahan Conference on Security Technology, 2014

2013
Iris image reconstruction from binary templates: An efficient probabilistic approach based on genetic algorithms.
Computer Vision and Image Understanding, 2013

The DooDB Graphical Password Database: Data Analysis and Benchmark Results.
IEEE Access, 2013

Dynamic Signature Verification on Smart Phones.
Proceedings of the Highlights on Practical Applications of Agents and Multi-Agent Systems, 2013

Security evaluation of i-vector based speaker verification systems against hill-climbing attacks.
Proceedings of the INTERSPEECH 2013, 2013

Variations of handwritten signatures with time: A sigma-lognormal analysis.
Proceedings of the International Conference on Biometrics, 2013


Multimodal Biometric Fusion: A Study on Vulnerabilities to Indirect Attacks.
Proceedings of the Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2013

2012
Synthetic on-line signature generation. Part I: Methodology and algorithms.
Pattern Recognition, 2012

Synthetic on-line signature generation. Part II: Experimental validation.
Pattern Recognition, 2012

A high performance fingerprint liveness detection method based on quality related features.
Future Generation Comp. Syst., 2012

Inverse biometrics: A case study in hand geometry authentication.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Face verification put to test: A hill-climbing attack based on the uphill-simplex algorithm.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012

Iris liveness detection based on quality related features.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012

On the Vulnerability of Iris-Based Systems to a Software Attack Based on a Genetic Algorithm.
Proceedings of the Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2012

2011
Evaluation of direct attacks to fingerprint verification systems.
Telecommunication Systems, 2011

An evaluation of indirect attacks and countermeasures in fingerprint verification systems.
Pattern Recognition Letters, 2011

Quality Analysis of Dynamic Signature Based on the Sigma-Lognormal Model.
Proceedings of the 2011 International Conference on Document Analysis and Recognition, 2011

Predicting iris vulnerability to direct attacks based on quality related features.
Proceedings of the International Carnahan Conference on Security Technology, 2011

Hill-Climbing Attack Based on the Uphill Simplex Algorithm and Its Application to Signature Verification.
Proceedings of the Biometrics and ID Management, 2011

2010
An evaluation of direct attacks using fake fingers generated from ISO templates.
Pattern Recognition Letters, 2010

On the vulnerability of face verification systems to hill-climbing attacks.
Pattern Recognition, 2010

The Multiscenario Multienvironment BioSecure Multimodal Database (BMDB).
IEEE Trans. Pattern Anal. Mach. Intell., 2010

BiosecurID: a multimodal biometric database.
Pattern Anal. Appl., 2010

Exploiting Character Class Information in Forensic Writer Identification.
Proceedings of the Computational Forensics - 4th International Workshop, 2010

A Comparative Evaluation of Finger-Drawn Graphical Password Verification Methods.
Proceedings of the International Conference on Frontiers in Handwriting Recognition, 2010

Kinematical Analysis of Synthetic Dynamic Signatures Using the Sigma-Lognormal Model.
Proceedings of the International Conference on Frontiers in Handwriting Recognition, 2010

2009
Improving the Enrollment in Dynamic Signature Verfication with Synthetic Samples.
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009

Evaluation of Brute-force Attack to Dynamic Signature Verification Using Synthetic Samples.
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009

Robustness of Signature Verification Systems to Imitators with Increasing Skills.
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009

Vulnerability Assessment of Fingerprint Matching Based on Time Analysis.
Proceedings of the Biometric ID Management and Multimodal Communication, 2009

2008
Towards mobile authentication using dynamic signature verification: Useful features and performance evaluation.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Fake fingertip generation from a minutiae template.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Performance and robustness: A trade-off in dynamic signature verification.
Proceedings of the IEEE International Conference on Acoustics, 2008

Direct Attacks Using Fake Images in Iris Verification.
Proceedings of the Biometrics and Identity Management, First European Workshop, 2008

2007
Bayesian Hill-Climbing Attack and Its Application to Signature Verification.
Proceedings of the Advances in Biometrics, International Conference, 2007

Biometric Hashing Based on Genetic Selection and Its Application to On-Line Signatures.
Proceedings of the Advances in Biometrics, International Conference, 2007

Feature Selection Based on Genetic Algorithms for On-Line Signature Verification.
Proceedings of the 2007 IEEE Workshop on Automatic Identification Advanced Technologies, 2007


  Loading...