Javier Galbally
Orcid: 0000-0002-2009-0256
According to our database1,
Javier Galbally
authored at least 99 papers
between 2007 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Fingerprint quality per individual finger type: A large-scale study on real operational data.
Proceedings of the 11th International Workshop on Biometrics and Forensics, 2023
2022
On the vulnerability of fingerprint verification systems to fake fingerprint attacks.
CoRR, 2022
2021
Introduction to Presentation Attack Detection in Iris Biometrics and Recent Advances.
CoRR, 2021
Introduction to Presentation Attack Detection in Face Biometrics and Recent Advances.
CoRR, 2021
Proceedings of the 16th International Conference on Document Analysis and Recognition, 2021
2020
CoRR, 2020
Comput. Secur., 2020
IEEE Access, 2020
2019
Proceedings of the Handbook of Biometric Anti-Spoofing, 2019
Proceedings of the Handbook of Biometric Anti-Spoofing, 2019
Proceedings of the Handbook of Biometric Anti-Spoofing, 2019
IEEE Trans. Inf. Forensics Secur., 2019
Fingerprint growth model for mitigating the ageing effect on children's fingerprints matching.
Pattern Recognit., 2019
Proceedings of the 2019 International Conference on Biometrics, 2019
Proceedings of the 2019 International Conference on Biometrics, 2019
2018
General Framework to Evaluate Unlinkability in Biometric Template Protection Systems.
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Inf. Forensics Secur., 2018
Proceedings of the 2018 International Conference of the Biometrics Special Interest Group, 2018
2017
A New Multimodal Approach for Password Strength Estimation - Part II: Experimental Evaluation.
IEEE Trans. Inf. Forensics Secur., 2017
A New Multimodal Approach for Password Strength Estimation - Part I: Theory and Algorithms.
IEEE Trans. Inf. Forensics Secur., 2017
Pattern Recognit., 2017
Privacy-Preserving Comparison of Variable-Length Data With Application to Biometric Template Protection.
IEEE Access, 2017
Proceedings of the International Carnahan Conference on Security Technology, 2017
Divide, recombine and conquer: Syntactic patterns-reassembly algorithm applied to password guessing process.
Proceedings of the International Carnahan Conference on Security Technology, 2017
Accuracy evaluation of handwritten signature verification: Rethinking the random-skilled forgeries dichotomy.
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017
Full 3D touchless fingerprint recognition: Sensor, database and baseline performance.
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017
2016
IEEE Trans. Hum. Mach. Syst., 2016
Inf. Sci., 2016
Three-dimensional and two-and-a-half-dimensional face recognition spoofing using three-dimensional printed models.
IET Biom., 2016
Variable-length template protection based on homomorphic encryption with application to signature biometrics.
Proceedings of the 4th International Conference on Biometrics and Forensics, 2016
Proceedings of the 4th International Conference on Biometrics and Forensics, 2016
Proceedings of the 5th International Conference on Pattern Recognition Applications and Methods, 2016
Implementation of Fixed-Length Template Protection Based on Homomorphic Encryption with Application to Signature Biometrics.
Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2016
2015
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015
On-line signature recognition through the combination of real dynamic data and synthetically generated static data.
Pattern Recognit., 2015
Towards cancelable multi-biometrics based on bloom filters: a case study on feature level fusion of face and iris.
Proceedings of the 3rd International Workshop on Biometrics and Forensics, 2015
Enhanced on-line signature verification based on skilled forgery detection using Sigma-LogNormal Features.
Proceedings of the International Conference on Biometrics, 2015
2014
Proceedings of the Handbook of Biometric Anti-Spoofing, 2014
Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition.
IEEE Trans. Image Process., 2014
Recent developments in the study of rapid human movements with the kinematic theory: Applications to handwriting and signature synthesis.
Pattern Recognit. Lett., 2014
Efficient software attack to multimodal biometric systems and its application to face and iris fusion.
Pattern Recognit. Lett., 2014
A novel hand reconstruction approach and its application to vulnerability assessment.
Inf. Sci., 2014
IET Biom., 2014
Proceedings of the Computational Forensics, 2014
Children Gender Recognition Under Unconstrained Conditions Based on Contextual Information.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014
Protected Facial Biometric Templates Based on Local Gabor Patterns and Adaptive Bloom Filters.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014
Proceedings of the 22nd International Conference on Pattern Recognition, 2014
Proceedings of the 14th International Conference on Frontiers in Handwriting Recognition, 2014
Proceedings of the International Carnahan Conference on Security Technology, 2014
2013
Iris image reconstruction from binary templates: An efficient probabilistic approach based on genetic algorithms.
Comput. Vis. Image Underst., 2013
IEEE Access, 2013
Proceedings of the Highlights on Practical Applications of Agents and Multi-Agent Systems, 2013
Security evaluation of i-vector based speaker verification systems against hill-climbing attacks.
Proceedings of the INTERSPEECH 2013, 2013
Proceedings of the International Conference on Biometrics, 2013
Proceedings of the International Conference on Biometrics, 2013
Proceedings of the Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2013
2012
Pattern Recognit., 2012
Pattern Recognit., 2012
A high performance fingerprint liveness detection method based on quality related features.
Future Gener. Comput. Syst., 2012
Proceedings of the 21st International Conference on Pattern Recognition, 2012
Face verification put to test: A hill-climbing attack based on the uphill-simplex algorithm.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012
Proceedings of the 5th IAPR International Conference on Biometrics, 2012
On the Vulnerability of Iris-Based Systems to a Software Attack Based on a Genetic Algorithm.
Proceedings of the Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2012
2011
Telecommun. Syst., 2011
An evaluation of indirect attacks and countermeasures in fingerprint verification systems.
Pattern Recognit. Lett., 2011
Proceedings of the 2011 International Conference on Document Analysis and Recognition, 2011
Proceedings of the International Carnahan Conference on Security Technology, 2011
Hill-Climbing Attack Based on the Uphill Simplex Algorithm and Its Application to Signature Verification.
Proceedings of the Biometrics and ID Management, 2011
2010
Pattern Recognit. Lett., 2010
Pattern Recognit., 2010
IEEE Trans. Pattern Anal. Mach. Intell., 2010
Proceedings of the Computational Forensics - 4th International Workshop, 2010
Proceedings of the International Conference on Frontiers in Handwriting Recognition, 2010
Kinematical Analysis of Synthetic Dynamic Signatures Using the Sigma-Lognormal Model.
Proceedings of the International Conference on Frontiers in Handwriting Recognition, 2010
2009
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009
Evaluation of Brute-force Attack to Dynamic Signature Verification Using Synthetic Samples.
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009
Proceedings of the Biometric ID Management and Multimodal Communication, 2009
2008
Towards mobile authentication using dynamic signature verification: Useful features and performance evaluation.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008
Proceedings of the IEEE International Conference on Acoustics, 2008
Proceedings of the Biometrics and Identity Management, First European Workshop, 2008
2007
Proceedings of the Advances in Biometrics, International Conference, 2007
Biometric Hashing Based on Genetic Selection and Its Application to On-Line Signatures.
Proceedings of the Advances in Biometrics, International Conference, 2007
Proceedings of the 2007 IEEE Workshop on Automatic Identification Advanced Technologies, 2007