Julian Fiérrez

According to our database1, Julian Fiérrez authored at least 186 papers between 2002 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Facial Soft Biometrics for Recognition in the Wild: Recent Works, Annotation, and COTS Evaluation.
IEEE Trans. Information Forensics and Security, 2018

Benchmarking Touchscreen Biometrics for Mobile Authentication.
IEEE Trans. Information Forensics and Security, 2018

Multiple classifiers in biometrics. Part 2: Trends and challenges.
Information Fusion, 2018

Multiple classifiers in biometrics. part 1: Fundamentals and review.
Information Fusion, 2018

Trends and Controversies.
IEEE Intelligent Systems, 2018

Exploring Recurrent Neural Networks for On-Line Handwritten Signature Biometrics.
IEEE Access, 2018

Person Recognition beyond the Visible Spectrum: Combining Body Shape and Texture from mmW Images.
Proceedings of the 2018 International Conference on Biometrics, 2018

2017
Exploring Body Shape From mmW Images for Person Recognition.
IEEE Trans. Information Forensics and Security, 2017

Multi-biometric template protection based on Homomorphic Encryption.
Pattern Recognition, 2017

Signature authentication based on human intervention: performance and complementarity with automatic systems.
IET Biometrics, 2017

Privacy-Preserving Comparison of Variable-Length Data With Application to Biometric Template Protection.
IEEE Access, 2017

Millimetre wave person recognition: Hand-crafted vs learned features.
Proceedings of the IEEE International Conference on Identity, 2017

Complexity-Based Biometric Signature Verification.
Proceedings of the 14th IAPR International Conference on Document Analysis and Recognition, 2017

Biometric Signature Verification Using Recurrent Neural Networks.
Proceedings of the 14th IAPR International Conference on Document Analysis and Recognition, 2017

Human-Assisted Signature Recognition Based on Comparative Attributes.
Proceedings of the 1st International Workshop on Human-Document Interaction, 2017

Exploring a statistical method for touchscreen swipe biometrics.
Proceedings of the International Carnahan Conference on Security Technology, 2017

Humans in the loop: Study of semi-automatic signature recognition based on attributes.
Proceedings of the International Carnahan Conference on Security Technology, 2017

Body Shape-Based Biometric Person Recognition from mmW Images.
Proceedings of the Pattern Recognition and Image Analysis - 8th Iberian Conference, 2017

2016
Graphical Password-Based User Authentication With Free-Form Doodles.
IEEE Trans. Human-Machine Systems, 2016

Unlinkable and irreversible biometric template protection based on bloom filters.
Inf. Sci., 2016

Keystroke Biometrics Ongoing Competition.
IEEE Access, 2016

Signature Recognition: Human Performance Analysis vs. Automatic System and Feature Extraction via Crowdsourcing.
Proceedings of the Pattern Recognition - 8th Mexican Conference, 2016

Signature recognition: establishing human baseline performance via crowdsourcing.
Proceedings of the 4th International Conference on Biometrics and Forensics, 2016

Variable-length template protection based on homomorphic encryption with application to signature biometrics.
Proceedings of the 4th International Conference on Biometrics and Forensics, 2016

Towards human-assisted signature recognition: Improving biometric systems through attribute-based recognition.
Proceedings of the IEEE International Conference on Identity, 2016

Image-based gender estimation from body and face across distances.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

On the evaluation of human ratings for signature recognition.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2016

Dealing with occlusions in face recognition by region-based fusion.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2016

Message from the Program Chairs.
Proceedings of the International Conference on Biometrics, 2016

Implementation of Fixed-Length Template Protection Based on Homomorphic Encryption with Application to Signature Biometrics.
Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2016

KBOC: Keystroke biometrics OnGoing competition.
Proceedings of the 8th IEEE International Conference on Biometrics Theory, 2016

2015
Signature Matching.
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015

Signature Features.
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015

Signature Databases and Evaluation.
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015

Fusion, User-Specific.
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015

Quality Measures in Biometric Systems.
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015

Fingerprint Databases and Evaluation.
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015

Biometrics Systems Under Spoofing Attack: An evaluation methodology and lessons learned.
IEEE Signal Process. Mag., 2015

Synthesis of large scale hand-shape databases for biometric applications.
Pattern Recognition Letters, 2015

On-line signature recognition through the combination of real dynamic data and synthetically generated static data.
Pattern Recognition, 2015

Pre-registration of latent fingerprints based on orientation field.
IET Biometrics, 2015

Feature exploration for biometric recognition using millimetre wave body images.
EURASIP J. Image and Video Processing, 2015

Preprocessing and Feature Selection for Improved Sensor Interoperability in Online Biometric Signature Verification.
IEEE Access, 2015

Update strategies for HMM-based dynamic signature biometric systems.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Integrating rare minutiae in generic fingerprint matchers for forensics.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

E-biosign: stylus- and finger-input multi-device database for dynamic signature recognition.
Proceedings of the 3rd International Workshop on Biometrics and Forensics, 2015

Feature-based dynamic signature verification under forensic scenarios.
Proceedings of the 3rd International Workshop on Biometrics and Forensics, 2015

Towards cancelable multi-biometrics based on bloom filters: a case study on feature level fusion of face and iris.
Proceedings of the 3rd International Workshop on Biometrics and Forensics, 2015

Keystroke Biometrics for Student Authentication: A Case Study.
Proceedings of the 2015 ACM Conference on Innovation and Technology in Computer Science Education, 2015

Increasing the robustness of biometric templates for dynamic signature biometric systems.
Proceedings of the International Carnahan Conference on Security Technology, 2015

Score normalization for keystroke dynamics biometrics.
Proceedings of the International Carnahan Conference on Security Technology, 2015

Optimal feature selection and inter-operability compensation for on-line biometric signature authentication.
Proceedings of the International Conference on Biometrics, 2015

One-handed Keystroke Biometric Identification Competition.
Proceedings of the International Conference on Biometrics, 2015

Enhanced on-line signature verification based on skilled forgery detection using Sigma-LogNormal Features.
Proceedings of the International Conference on Biometrics, 2015

e-BioSign tool: Towards scientific assessment of dynamic signatures under forensic conditions.
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015

Keystroke dynamics recognition based on personal data: A comparative experimental evaluation implementing reproducible research.
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015

Pose Variability Compensation Using Projective Transformation Forensic Face Recognition.
Proceedings of the BIOSIG 2015, 2015

2014
Fingerprint Anti-spoofing in Biometric Systems.
Proceedings of the Handbook of Biometric Anti-Spoofing, 2014

Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition.
IEEE Trans. Image Processing, 2014

Soft Biometrics and Their Application in Person Recognition at a Distance.
IEEE Trans. Information Forensics and Security, 2014

Efficient software attack to multimodal biometric systems and its application to face and iris fusion.
Pattern Recognition Letters, 2014

A novel hand reconstruction approach and its application to vulnerability assessment.
Inf. Sci., 2014

Regional fusion for high-resolution palmprint recognition using spectral minutiae representation.
IET Biometrics, 2014

Mobile signature verification: feature robustness and performance comparison.
IET Biometrics, 2014

Biometric Antispoofing Methods: A Survey in Face Recognition.
IEEE Access, 2014

Biografo: An Integrated Tool for Forensic Writer Identification.
Proceedings of the Computational Forensics, 2014

A Study of Identification Performance of Facial Regions from CCTV Images.
Proceedings of the Computational Forensics, 2014

Partial fingerprint registration for forensics using minutiae-generated orientation fields.
Proceedings of the 2nd International Workshop on Biometrics and Forensics, 2014

Pre-registration for Improved Latent Fingerprint Identification.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

Comparison of Body Shape Descriptors for Biometric Recognition Using MMW Images.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

Protected Facial Biometric Templates Based on Local Gabor Patterns and Adaptive Bloom Filters.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

Towards Predicting Good Users for Biometric Recognition Based on Keystroke Dynamics.
Proceedings of the Computer Vision - ECCV 2014 Workshops, 2014

2013
Comparative Analysis and Fusion of Spatiotemporal Information for Footstep Recognition.
IEEE Trans. Pattern Anal. Mach. Intell., 2013

Iris image reconstruction from binary templates: An efficient probabilistic approach based on genetic algorithms.
Computer Vision and Image Understanding, 2013

The DooDB Graphical Password Database: Data Analysis and Benchmark Results.
IEEE Access, 2013

Towards Regional Fusion for High-Resolution Palmprint Recognition.
Proceedings of the XXVI Conference on Graphics, Patterns and Images, 2013

Comparative Analysis of the Variability of Facial Landmarks for Forensics Using CCTV Images.
Proceedings of the Image and Video Technology - 6th Pacific-Rim Symposium, 2013

Evaluation of AFIS-Ranked Latent Fingerprint Matched Templates.
Proceedings of the Image and Video Technology - 6th Pacific-Rim Symposium, 2013

Analysis of Gait Recognition on Constrained Scenarios with Limited Data Information.
Proceedings of the Highlights on Practical Applications of Agents and Multi-Agent Systems, 2013

Analysing Facial Regions for Face Recognition Using Forensic Protocols.
Proceedings of the Highlights on Practical Applications of Agents and Multi-Agent Systems, 2013

Dynamic Signature Verification on Smart Phones.
Proceedings of the Highlights on Practical Applications of Agents and Multi-Agent Systems, 2013

On the use of spectral minutiae in high-resolution palmprint recognition.
Proceedings of the 1st International Workshop on Biometrics and Forensics, 2013

Analysis of the variability of facial landmarks in a forensic scenario.
Proceedings of the 1st International Workshop on Biometrics and Forensics, 2013

Understanding the discrimination power of facial regions in forensic casework.
Proceedings of the 1st International Workshop on Biometrics and Forensics, 2013

Assessment of gait recognition based on the lower part of the human body.
Proceedings of the 1st International Workshop on Biometrics and Forensics, 2013

A novel approach of gait recognition through fusion with footstep information.
Proceedings of the International Conference on Biometrics, 2013

Variations of handwritten signatures with time: A sigma-lognormal analysis.
Proceedings of the International Conference on Biometrics, 2013


Fusion of Facial Regions Using Color Information in a Forensic Scenario.
Proceedings of the Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2013

Multimodal Biometric Fusion: A Study on Vulnerabilities to Indirect Attacks.
Proceedings of the Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2013

2012
BioSecure signature evaluation campaign (BSEC'2009): Evaluating online signature algorithms depending on the quality of signatures.
Pattern Recognition, 2012

Synthetic on-line signature generation. Part I: Methodology and algorithms.
Pattern Recognition, 2012

Synthetic on-line signature generation. Part II: Experimental validation.
Pattern Recognition, 2012

Quality Measures in Biometric Systems.
IEEE Security & Privacy, 2012

A high performance fingerprint liveness detection method based on quality related features.
Future Generation Comp. Syst., 2012

Inverse biometrics: A case study in hand geometry authentication.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Improving radial triangulation-based forensic palmprint recognition according to point pattern comparison by relaxation.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012

Face verification put to test: A hill-climbing attack based on the uphill-simplex algorithm.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012

Iris liveness detection based on quality related features.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012

Variability Compensation Using NAP for Unconstrained Face Recognition.
Proceedings of the Distributed Computing and Artificial Intelligence, 2012

On the Vulnerability of Iris-Based Systems to a Software Attack Based on a Genetic Algorithm.
Proceedings of the Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2012

2011
Evaluation of direct attacks to fingerprint verification systems.
Telecommunication Systems, 2011

An evaluation of indirect attacks and countermeasures in fingerprint verification systems.
Pattern Recognition Letters, 2011

Quality Analysis of Dynamic Signature Based on the Sigma-Lognormal Model.
Proceedings of the 2011 International Conference on Document Analysis and Recognition, 2011

Predicting iris vulnerability to direct attacks based on quality related features.
Proceedings of the International Carnahan Conference on Security Technology, 2011

Distance-based feature extraction for biometric recognition of Millimeter Wave body images.
Proceedings of the International Carnahan Conference on Security Technology, 2011

Latent-to-full palmprint comparison based on radial triangulation under forensic conditions.
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011

Hill-Climbing Attack Based on the Uphill Simplex Algorithm and Its Application to Signature Verification.
Proceedings of the Biometrics and ID Management, 2011

2010
Cancelable Templates for Sequence-Based Biometrics with Application to On-line Signature Recognition.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2010

Quality-Based Conditional Processing in Multi-Biometrics: Application to Sensor Interoperability.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2010

An evaluation of direct attacks using fake fingers generated from ISO templates.
Pattern Recognition Letters, 2010

On the vulnerability of face verification systems to hill-climbing attacks.
Pattern Recognition, 2010

The Multiscenario Multienvironment BioSecure Multimodal Database (BMDB).
IEEE Trans. Pattern Anal. Mach. Intell., 2010

BiosecurID: a multimodal biometric database.
Pattern Anal. Appl., 2010

Exploiting Character Class Information in Forensic Writer Identification.
Proceedings of the Computational Forensics - 4th International Workshop, 2010

Analysis of Time Domain Information for Footstep Recognition.
Proceedings of the Advances in Visual Computing - 6th International Symposium, 2010

Acquisition Scenario Analysis for Face Recognition at a Distance.
Proceedings of the Advances in Visual Computing - 6th International Symposium, 2010

Towards a Better Understanding of the Performance of Latent Fingerprint Recognition in Realistic Forensic Conditions.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

A Comparative Evaluation of Finger-Drawn Graphical Password Verification Methods.
Proceedings of the International Conference on Frontiers in Handwriting Recognition, 2010

DooDB: A Graphical Password Database Containing Doodles and Pseudo-Signatures.
Proceedings of the International Conference on Frontiers in Handwriting Recognition, 2010

Kinematical Analysis of Synthetic Dynamic Signatures Using the Sigma-Lognormal Model.
Proceedings of the International Conference on Frontiers in Handwriting Recognition, 2010

Forensic Writer Identification Using Allographic Features.
Proceedings of the International Conference on Frontiers in Handwriting Recognition, 2010

Face Recognition at a Distance: Scenario Analysis and Applications.
Proceedings of the Distributed Computing and Artificial Intelligence, 2010

Scenario-based score fusion for face recognition at a distance.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2010

2009
Signature Matching.
Proceedings of the Encyclopedia of Biometrics, 2009

Signature Features.
Proceedings of the Encyclopedia of Biometrics, 2009

Signature Databases and Evaluation.
Proceedings of the Encyclopedia of Biometrics, 2009

Fusion, User-Specific.
Proceedings of the Encyclopedia of Biometrics, 2009

Fingerprint Databases and Evaluation.
Proceedings of the Encyclopedia of Biometrics, 2009

Benchmarking quality-dependent and cost-sensitive score-level multimodal biometric fusion algorithms.
IEEE Trans. Information Forensics and Security, 2009

Improving the Enrollment in Dynamic Signature Verfication with Synthetic Samples.
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009

Evaluation of Brute-force Attack to Dynamic Signature Verification Using Synthetic Samples.
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009

Robustness of Signature Verification Systems to Imitators with Increasing Skills.
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009

Analysis of the Utility of Classical and Novel Speech Quality Measures for Speaker Verification.
Proceedings of the Advances in Biometrics, Third International Conference, 2009

Biometrics beyond the Visible Spectrum: Imaging Technologies and Applications.
Proceedings of the Biometric ID Management and Multimodal Communication, 2009

Vulnerability Assessment of Fingerprint Matching Based on Time Analysis.
Proceedings of the Biometric ID Management and Multimodal Communication, 2009

Comparison of Distance-Based Features for Hand Geometry Authentication.
Proceedings of the Biometric ID Management and Multimodal Communication, 2009

2008
Fingerprint Image-Quality Estimation and its Application to Multialgorithm Verification.
IEEE Trans. Information Forensics and Security, 2008

Performance of fingerprint quality measures depending on sensor technology.
J. Electronic Imaging, 2008

BioSec Multimodal Biometric Database in Text-Dependent Speaker Recognition.
Proceedings of the International Conference on Language Resources and Evaluation, 2008

Towards mobile authentication using dynamic signature verification: Useful features and performance evaluation.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Fake fingertip generation from a minutiae template.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Performance and robustness: A trade-off in dynamic signature verification.
Proceedings of the IEEE International Conference on Acoustics, 2008

Dynamic signature verification with template protection using helper data.
Proceedings of the IEEE International Conference on Acoustics, 2008

Direct Attacks Using Fake Images in Iris Verification.
Proceedings of the Biometrics and Identity Management, First European Workshop, 2008

2007
A Comparative Study of Fingerprint Image-Quality Estimation Methods.
IEEE Trans. Information Forensics and Security, 2007

Speaker verification using speaker- and test-dependent fast score normalization.
Pattern Recognition Letters, 2007

HMM-based on-line signature verification: Feature extraction and signature modeling.
Pattern Recognition Letters, 2007

Biosec baseline corpus: A multimodal biometric database.
Pattern Recognition, 2007

Biosecure reference systems for on-line signature verification: A study of complementarity.
Annales des Télécommunications, 2007

Combining multiple matchers for fingerprint verification: A case study in biosecure network of excellence.
Annales des Télécommunications, 2007

Automatic Measures for Predicting Performance in Off-Line Signature.
Proceedings of the International Conference on Image Processing, 2007

On The Effects of Sampling Rate and Interpolation in HMM-Based Dynamic Signature Verification.
Proceedings of the 9th International Conference on Document Analysis and Recognition (ICDAR 2007), 2007

On the Applicability of Off-Line Signatures to the Fuzzy Vault Construction.
Proceedings of the 9th International Conference on Document Analysis and Recognition (ICDAR 2007), 2007

Bayesian Hill-Climbing Attack and Its Application to Signature Verification.
Proceedings of the Advances in Biometrics, International Conference, 2007

Biometric Hashing Based on Genetic Selection and Its Application to On-Line Signatures.
Proceedings of the Advances in Biometrics, International Conference, 2007

Feature Selection Based on Genetic Algorithms for On-Line Signature Verification.
Proceedings of the 2007 IEEE Workshop on Automatic Identification Advanced Technologies, 2007

2006
Using quality measures for multilevel speaker recognition.
Computer Speech & Language, 2006

Incorporating Image Quality in Multi-algorithm Fingerprint Verification.
Proceedings of the Advances in Biometrics, International Conference, 2006

Sensor Interoperability and Fusion in Fingerprint Verification: A Case Study using Minutiae-and Ridge-Based Matchers.
Proceedings of the Ninth International Conference on Control, 2006

2005
Target dependent score normalization techniques and their application to signature verification.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2005

Adapted user-dependent multimodal biometric authentication exploiting general information.
Pattern Recognition Letters, 2005

Discriminative multimodal biometric authentication based on quality measures.
Pattern Recognition, 2005

Bayesian adaptation for user-dependent multimodal biometric authentication.
Pattern Recognition, 2005

Speaker Verification Using Adapted User-Dependent Multilevel Fusion.
Proceedings of the Multiple Classifier Systems, 6th International Workshop, 2005

Fusion of Local and Regional Approaches for On-Line Signature Verification.
Proceedings of the Advances in Biometric Person Authentication, 2005

Sensor Interoperability and Fusion in Signature Verification: A Case Study Using Tablet PC.
Proceedings of the Advances in Biometric Person Authentication, 2005

Combining Multiple Matchers for Fingerprint Verification: A Case Study in FVC2004.
Proceedings of the Image Analysis and Processing, 2005

Between-Source Modelling for Likelihood Ratio Computation in Forensic Biometric Recognition.
Proceedings of the Audio- and Video-Based Biometric Person Authentication, 2005

An On-Line Signature Verification System Based on Fusion of Local and Global Information.
Proceedings of the Audio- and Video-Based Biometric Person Authentication, 2005

2004
On the use of quality measures for text-independent speaker recognition.
Proceedings of the ODYSSEY 2004 - The Speaker and Language Recognition Workshop, Toledo, Spain, May 31, 2004

Target Dependent Score Normalization Techniques and Their Application to Signature Verification.
Proceedings of the Biometric Authentication, First International Conference, 2004

Exploiting general knowledge in user-dependent fusion strategies for multimodal biometric verification.
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004

An Off-line Signature Verification System Based on Fusion of Local and Global Information.
Proceedings of the Biometric Authentication, 2004

2003
Support vector machine fusion of idiolectal and acoustic speaker information in Spanish conversational speech.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

Fusion strategies in multimodal biometric verification.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

A comparative evaluation of global representation-based schemes for face verification.
Proceedings of the 2003 International Conference on Image Processing, 2003

Multimodal biometric authentication using quality signals in mobile communications.
Proceedings of the 12th International Conference on Image Analysis and Processing (ICIAP 2003), 2003

Forensic identification reporting using automatic speaker recognition systems.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003

Support vector machine fusion of idiolectal and acoustic speaker information in Spanish conversational speech.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003

Complete Signal Modeling and Score Normalization for Function-Based Dynamic Signature Verification.
Proceedings of the Audio-and Video-Based Biometrie Person Authentication, 2003

U-NORM Likelihood Normalization in PIN-Based Speaker Verification Systems.
Proceedings of the Audio-and Video-Based Biometrie Person Authentication, 2003

A Comparative Evaluation of Fusion Strategies for Multimodal Biometric Verification.
Proceedings of the Audio-and Video-Based Biometrie Person Authentication, 2003

Combining Biometric Evidence for Person Authentication.
Proceedings of the Advanced Studies in Biometrics, Summer School on Biometrics, 2003

2002
Adaptive morphological time stamp segmentation based on efficient global motion estimation.
Proceedings of the 2002 International Conference on Image Processing, 2002

Biometric Identification in Forensic Cases According to the Bayesian Approach.
Proceedings of the Biometric Authentication, 2002


  Loading...