Computational Intelligence - February 2017 - 28
[8] International Air Transport Association. (2014). IATA press release No. 57 [Online].
Available: http://www.iata.org/pressroom/pr/Pages/2014-10-16-01.aspx
[9] S. Eastwood, V. Shmerko, S. Yanushkevich, et al. "Biometric-enabled authentication
machines: A survey of open-set real-world applications," IEEE Trans. Hum. Mach. Syst.,
vol. 46, no. 2, pp. 231-242, 2016.
[10] X. Nie, R. Batta, C. G. Drury, and L. Lin, "Passenger grouping with risk levels in an
airport security system," Eur. J. Oper. Res ., vol. 194, no. 2, pp. 574-584, 2009.
[11] R. D. Labati, A. Genovese, E. Muñoz, V. Piuri, F. Scotti, and G. Sforza, "Biometric
recognition in automated border control: A survey," ACM Comput. Surv., vol. 49, no. 2,
pp. A:1-A:39, 2016.
[12] U.S. Department of Justice Office of the Inspector General. (2007). Follow-up audit
of the terrorist screening center [Online]. Available: https://oig.justice.gov/reports/FBI/
a0741/final.pdf
[13] EU European Commission B-1049. (2014). Technical study on smart borders
[Online]. Available: http://www.europarl.europa.eu/meetdocs/2014_2019/documents/
libe/dv/smart_borders_report_/smart_borders_report_en.pdf
[14] I. Graves, M. Butavicius, V. MacLeod, et al. "The role of the human operator in
image-based airport security technologies," in Innovations in Defence Support Systems-2.
New York: Springer-Verlag, 2011, pp. 147-181.
[15] D. Hunter, B. Tiddeman, and D. Perrett, "Facial ageing," in Craniofacial Identification, C. Wilkinson and C. Rynn, Eds. New York: Cambridge Univ. Press, 2012, ch. 5,
pp. 57-67.
[16] X. Geng, Z. H. Zhou, and K. Smith-Miles, "Automatic age estimation based on facial
aging patterns," IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 12, pp. 2234-2240, 2007.
[17] H. S. Bhatt, S. Bharadwaj, R. Singh, and M. Vatsa, "Recognizing surgically altered
face images using multiobjective evolutionary algorithm," IEEE Trans. Inf. Foren. Sci., vol. 8,
no. 1, pp. 89-100, 2013.
[18] R. Jillela and A. Ross, "Mitigating effects of plastic surgery: Fusing face and ocular
biometrics," in Proc. IEEE 5th Int. Conf. Biometrics: Theory, Applications and Systems, 2012,
pp. 402-411.
[19] S. E. Baker, A. Hentz, K. W. Bowyer, and P. J. Flynn, "Degradation of iris recognition performance due to non-cosmetic prescription contact lenses," Comput. Vis. Image
Underst., vol. 114, no. 9, pp. 1030-1044, 2010.
[20] C. Chen, A. Dantcheva, and A. Ross, "Automatic facial makeup detection with
application in face recognition," in Proc. 6th IAPR Int. Conf. Biometrics, 2013, pp. 1-8.
[21] G. Doddington, W. Liggett, A. Martin, M. Przybocki, and D. Reynolds, "Sheep,
goats, lambs and wolves: A statistical analysis of speaker performance in the NIST 1998
speaker recognition evaluation," DTIC Tech. Rep., 1998.
[22] N. Yager and T. Dunstone, "The biometric menagerie," IEEE Trans. Pattern Anal.
Mach. Intell., vol. 32, no. 2, pp. 220-230, 2010.
[23] A. Rattani, "Adaptive biometric system based on template update procedures," Ph.D.
dissertation, Dept. Elect. Comp. Eng., Univ. Cagliari, Italy, 2010.
[24] T. Bourlai, A. Ross, and A. K. Jain, "Restoring degraded face images: A case study
in matching faxed, printed, and scanned photos," IEEE Trans. Inf. Foren. Sec., vol. 6, no. 2,
pp. 371-384, 2011.
[25] S. Orandi and R. M. McCabe, "Mobile ID device best practice recommendation,
version 1.0," NIST Information Access Division Information Technology Laboratory,
2009.
[26] C. Frowd, "Facial recall and computer composites," in Craniofacial Identification, C.
Wilkinson and C. Rynn, Eds. New York: Cambridge Univ. Press, 2012, ch. 4, pp. 42-56.
[27] U.S. Government. "The Privacy Act of 1974," 1974.
[28] M. Hildebrandt and S. Gutwirth. Profiling the European Citizen: Cross-Disciplinary Perspectives. The Netherlands: Springer, 2008.
[29] Great Britain Economic and Domestic Secretariat and Cabinet Office and United
Kingdom. "Identity fraud: A study," 2002.
[30] U.S. Department of Homeland Security. (2010). Biometric standards requirements
for US-VISIT, version 1.0 [Online]. Available: https://www.dhs.gov/xlibrary/assets/
usvisit/usvisit_biometric_standards.pdf
[31] B. Hayes and M. Vermeulen. Borderline the EU's New Border Surveillance Initiatives.
Heinrich Boll, 2012.
[32] Government Accountability Office. (2011). DoD can better conform to standards
and share biometric information with federal agencies, United States Government Accountability Office, GAO-11-276 [Online]. Available: http://www.gao.gov/new.items/
d11276.pdf
[33] Government Accountability Office. (2012). Defense biometrics: Additional training
for leaders and more timely transmission of data could enhance the use of biometrics in
Afghanistan, United States Government Accountability Office, GAO-12-442 [Online].
Available: http://www.gao.gov/assets/600/590311.pdf
[34] J. Florence and R. Friedman. (2010). Profiles in terror: A legal framework for the behavioral profiling paradigm, George Mason Law Rev., vol. 17, no. 2, pp. 423-481, [Online].
Available: http://www.georgemasonlawreview.org/archives/vol-17-no-2-winter-2010/
[35] International Air Transport Association. (2014). Checkpoint of the future. Executive summary. 4th proof [Online]. Available: https://www.iata.org/whatwedo/security/
Documents/cof-executive-summary.pdf
[36] S. Trochu and O. Touret, "Managing the border, smartly," in Proc. European Intelligence and Security Informatics Conf., 2013, pp. 281-284.
28
Ieee ComputatIonal IntellIgenCe magazIne | February 2017
[37] L. Best-Rowden, H. Han, C. Otto, B. F. Klare, and A. K. Jain, "Unconstrained face
recognition: Identifying a person of interest from a media collection," IEEE Trans. Inf.
Foren. Sec., vol. 9, no. 12, pp. 2144-2157, 2014.
[38] J. F. Nunamaker, D. C. Derrick, A. C. Elkins, et al. "Embodied conversational agentbased kiosk for automated interviewing," J. Manage. Inform. Syst., pp. 17-48, 2011.
[39] J. G. Proudfoot, "Evaluating the feasibility of using noncontact sensors to conduct a
targetless concealed information test," in Proc. European Intelligence and Security Informatics
Conf., 2013, pp. 269-272.
[40] Department of the Army. (2006). FM 2-22.3 Human intelligence collector operations [Online]. Available: http://fas.org/irp/doddir/army/fm2-22-3.pdf
[41] M. Butt, S. Marti, A. Nouak, J. Köplin, R. Raghavendra, and G. Li, "Towards
e-passport duplicate enrollment check in the European Union," in Proc. European Intelligence and Security Informatics Conf., 2013, pp. 247-251.
[42] S. Yanushkevich, S. Eastwood, S. Samoil, et al., "Taxonomy and modeling of impersonation in e-border authentication," in Proc. 6th Int. Conf. Emerging Security Technologies,
2015, pp. 38-43.
[43] D. Menotti, G. Chiachia, A. Pinto, et al. "Deep representations for iris, face, and fingerprint spoofing detection," IEEE Trans. Inf. Foren. Sec., vol. 10, no. 4, pp. 864-879, 2015.
[44] International Civil Aviation Organization. (2010). Document 9303, part 1, vol. 2,
e-passports.
[45] Frontex. (2011). Operational and technical security of electronic passports, Warsaw
[Online]. Available: http://frontex.europa.eu/assets/Publications/Research/Operational_
and_Technical_Security_of_Electronic_Pasports.pdf
[46] L. J. Spreeuwers, A. Hendrikse, and K. Gerritsen, "Evaluation of automatic face
recognition for automatic border control on actual data recorded of travellers at Schiphol
airport," in Proc. Int. Conf. Biometrics Special Interest Group, 2012, pp. 1-6.
[47] N. Poh, J. Kittler, and T. Bourlai, "Quality-based score normalization with device
qualitative information for multimodal biometric fusion," IEEE Trans. Syst. Man Cybern.
Part A: Syst. Hum., vol. 40, no. 3, pp. 539-554, 2010.
[48] G. Shafer. A Mathematical Theory of Evidence. Princeton, NJ: Princeton Univ. Press,
1976.
[49] R. Snelick, U. Uludag, A. Mink, M. Indovina, and A. Jain, "Large-scale evaluation
of multimodal biometric authentication using state-of-the-art systems," IEEE Trans. Pattern Anal. Mach. Intell., vol. 27, no. 3, pp. 450-455, 2005.
[50] L. Mezai and F. Hachouf, "Score-level fusion of face and voice using particle swarm
optimization and belief functions," IEEE Trans. Hum-Mach. Syst., vol. 45, no. 6, pp.
761-772, 2015.
[51] I. Chingovska and A. R. dos Anjos, "On the use of client identity information for face
antispoofing," IEEE Trans. Inf. Foren. Sec., vol. 10, no. 4, pp. 787-796, 2015.
[52] R. D. Labati, A. Genovese, E. M. Ballester, V. Piuri, F. Scotti, and G. Sforza,
"Automatic classification of acquisition problems affecting fingerprint images in automated border controls," in Proc. IEEE Symp. Series Computational Intelligence, 2015,
pp. 354-361.
[53] J. Maatta, A. Hadid, and M. Pietikainen, "Face spoofing detection from single images using texture and local shape analysis," IET Biometrics, vol. 1, no. 1, pp. 3-10, 2012.
[54] D. Easley and J. Kleinberg. Networks, Crowds, and Markets: Reasoning About a Highly
Connected World. Cambridge, U.K.: Cambridge Univ. Press, 2010.
[55] K. J. Hsiao, A. Kulesza, and A. O. Hero, "Social collaborative retrieval," IEEE J. Sel.
Top. Signal Process., vol. 8, no. 4, pp. 680-689, 2014.
[56] C. Tekin and M. van der Schaar, "Releaf: An algorithm for learning and exploiting
relevance," IEEE J. Sel. Top. Signal Process., vol. 9, no. 4, pp. 716-727, 2015.
[57] M. Wittman, P. Davis, and P. J. Flynn, "Empirical studies of the existence of the
biometric menagerie in the FRGC 2.0 color image corpus," in Proc. Conf. Computer Vision
and Pattern Recognition Workshop, 2006, pp. 33-33.
[58] A. Ross, A. Rattani, and M. Tistarelli, "Exploiting the Doddington zoo effect in
biometric fusion," in IEEE 3rd Int. Conf. Biometrics: Theory, Applications, and System, 2009,
pp. 1-7.
[59] A. Rattani and N. Poh, "Biometric system design under zero and non-zero effort
attacks," in Proc. Int. Conf. Biometrics, 2013, pp. 1-8.
[60] T. Dunstone and N. Yager. Biometric System and Data Analysis. Design, Evaluation, and
Data Mining. New York: Springer-Verlag, 2009.
[61] P. J. Phillips, P. J. Flynn, T. Scruggs, et al., "Overview of the face recognition grand
challenge," in Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition,
2005, vol. 1, pp. 947-954.
[62] F. Samria and A. Harter, "Parameterisation of a stochastic model for human face identification," in Proc. 2nd IEEE Workshop Applications Computer Vision, 1994, pp. 138-142.
[63] G. B. Huang, M. Ramesh, T. Berg, and E. Learned-Miller, "Labeled faces in the
wild: A database for studying face recognition in unconstrained environments," Univ.
Massachusetts, Amherst, Tech. Rep. 07-49, Oct. 2007.
[64] R. Cook, I. W. Evett, G. Jackson, P. Jones, and J. Lambert, "A model for case assessment and interpretation," Sci. Justice, vol. 38, no. 3, pp. 151-156, 1998.
[65] L. M. De Campos, J. F. Huete, and S. Moral, "Probability intervals: a tool for uncertain reasoning," Int. J. Uncertain. Fuzz., vol. 2, no. 2, pp. 167-196, 1994.
[66] S. Kullback. Information Theory and Statistics. New York: Wiley, 1959.
http://www.iata.org/pressroom/pr/Pages/2014-10-16-01.aspx
http://www.fas.org/irp/doddir/army/fm2-22-3.pdf
https://oig.justice.gov/reports/FBI/
http://www.europarl.europa.eu/meetdocs/2014_2019/documents/
http://frontex.europa.eu/assets/Publications/Research/Operational_
https://www.dhs.gov/xlibrary/assets/
http://www.gao.gov/new.items/
http://www.gao.gov/assets/600/590311.pdf
http://www.georgemasonlawreview.org/archives/vol-17-no-2-winter-2010/
https://www.iata.org/whatwedo/security/
Table of Contents for the Digital Edition of Computational Intelligence - February 2017
Computational Intelligence - February 2017 - Cover1
Computational Intelligence - February 2017 - Cover2
Computational Intelligence - February 2017 - 1
Computational Intelligence - February 2017 - 2
Computational Intelligence - February 2017 - 3
Computational Intelligence - February 2017 - 4
Computational Intelligence - February 2017 - 5
Computational Intelligence - February 2017 - 6
Computational Intelligence - February 2017 - 7
Computational Intelligence - February 2017 - 8
Computational Intelligence - February 2017 - 9
Computational Intelligence - February 2017 - 10
Computational Intelligence - February 2017 - 11
Computational Intelligence - February 2017 - 12
Computational Intelligence - February 2017 - 13
Computational Intelligence - February 2017 - 14
Computational Intelligence - February 2017 - 15
Computational Intelligence - February 2017 - 16
Computational Intelligence - February 2017 - 17
Computational Intelligence - February 2017 - 18
Computational Intelligence - February 2017 - 19
Computational Intelligence - February 2017 - 20
Computational Intelligence - February 2017 - 21
Computational Intelligence - February 2017 - 22
Computational Intelligence - February 2017 - 23
Computational Intelligence - February 2017 - 24
Computational Intelligence - February 2017 - 25
Computational Intelligence - February 2017 - 26
Computational Intelligence - February 2017 - 27
Computational Intelligence - February 2017 - 28
Computational Intelligence - February 2017 - 29
Computational Intelligence - February 2017 - 30
Computational Intelligence - February 2017 - 31
Computational Intelligence - February 2017 - 32
Computational Intelligence - February 2017 - 33
Computational Intelligence - February 2017 - 34
Computational Intelligence - February 2017 - 35
Computational Intelligence - February 2017 - 36
Computational Intelligence - February 2017 - 37
Computational Intelligence - February 2017 - 38
Computational Intelligence - February 2017 - 39
Computational Intelligence - February 2017 - 40
Computational Intelligence - February 2017 - 41
Computational Intelligence - February 2017 - 42
Computational Intelligence - February 2017 - 43
Computational Intelligence - February 2017 - 44
Computational Intelligence - February 2017 - 45
Computational Intelligence - February 2017 - 46
Computational Intelligence - February 2017 - 47
Computational Intelligence - February 2017 - 48
Computational Intelligence - February 2017 - 49
Computational Intelligence - February 2017 - 50
Computational Intelligence - February 2017 - 51
Computational Intelligence - February 2017 - 52
Computational Intelligence - February 2017 - 53
Computational Intelligence - February 2017 - 54
Computational Intelligence - February 2017 - 55
Computational Intelligence - February 2017 - 56
Computational Intelligence - February 2017 - Cover3
Computational Intelligence - February 2017 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com