@inproceedings{taigman2014deepface, author = {Taigman, Yaniv and Yang, Ming and Ranzato, Marc'Aurelio and Wolf, Lior}, booktitle = {Conference on Computer Vision and Pattern Recognition (CVPR)}, interhash = {19f4a0ed09dd182d9a45466f323efa72}, intrahash = {5704a9ab4c0abe0c34b34b7d564b9401}, title = {DeepFace: Closing the Gap to Human-Level Performance in Face Verification}, year = 2014 } @article{phillips2000introduction, abstract = {On the basis of media hype alone, you might conclude that biometric passwords will soon replace their alphanumeric counterparts with versions that cannot be stolen, forgotten, lost, or given to another person. But what if the actual performance of these systems falls short of the estimates? The authors designed this article to provide sufficient information to know what questions to ask when evaluating a biometric system, and to assist in determining whether performance levels meet the requirements of an application. For example, a low-performance biometric is probably sufficient for reducing-as opposed to eliminating-fraud. Likewise, completely replacing an existing security system with a biometric-based one may require a high-performance biometric system, or the required performance may be beyond what current technology can provide. Of the biometrics that give the user some control over data acquisition, voice, face, and fingerprint systems have undergone the most study and testing-and therefore occupy the bulk of this discussion. This article also covers the tools and techniques of biometric testing}, author = {Phillips, P.J. and Martin, A. and Wilson, C.L. and Przybocki, M.}, doi = {10.1109/2.820040}, interhash = {566f7a9e16fbd8437907e9ba2a34bb4b}, intrahash = {b84d37310fed293b821c56b00b3bfb36}, issn = {0018-9162}, journal = {Computer}, month = feb, number = 2, pages = {56-63}, title = {An introduction evaluating biometric systems}, volume = 33, year = 2000 }