{"id":"https://openalex.org/W3013140913","doi":"https://doi.org/10.1186/s13635-020-0102-6","title":"Understanding visual lip-based biometric authentication for mobile devices","display_name":"Understanding visual lip-based biometric authentication for mobile devices","publication_year":2020,"publication_date":"2020-03-12","ids":{"openalex":"https://openalex.org/W3013140913","doi":"https://doi.org/10.1186/s13635-020-0102-6","mag":"3013140913"},"language":"en","primary_location":{"id":"doi:10.1186/s13635-020-0102-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13635-020-0102-6","pdf_url":"https://jis-eurasipjournals.springeropen.com/track/pdf/10.1186/s13635-020-0102-6","source":{"id":"https://openalex.org/S4210195102","display_name":"EURASIP Journal on Information Security","issn_l":"2510-523X","issn":["2510-523X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://jis-eurasipjournals.springeropen.com/track/pdf/10.1186/s13635-020-0102-6","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091218020","display_name":"Carrie Wright","orcid":"https://orcid.org/0000-0002-3945-6772"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Carrie Wright","raw_affiliation_strings":["ECIT, Queen\u2019s University Belfast, Northern Ireland Science Park, Queen\u2019s Road, Queen\u2019s Island, Northern Ireland"],"affiliations":[{"raw_affiliation_string":"ECIT, Queen\u2019s University Belfast, Northern Ireland Science Park, Queen\u2019s Road, Queen\u2019s Island, Northern Ireland","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026517050","display_name":"Darryl Stewart","orcid":"https://orcid.org/0000-0003-1765-3545"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Darryl William Stewart","raw_affiliation_strings":["ECIT, Queen\u2019s University Belfast, Northern Ireland Science Park, Queen\u2019s Road, Queen\u2019s Island, Northern Ireland"],"affiliations":[{"raw_affiliation_string":"ECIT, Queen\u2019s University Belfast, Northern Ireland Science Park, Queen\u2019s Road, Queen\u2019s Island, Northern Ireland","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5091218020"],"corresponding_institution_ids":[],"apc_list":{"value":660,"currency":"GBP","value_usd":809},"apc_paid":{"value":660,"currency":"GBP","value_usd":809},"fwci":1.3713,"has_fulltext":true,"cited_by_count":13,"citation_normalized_percentile":{"value":0.80891011,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2020","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10860","display_name":"Speech and Audio Processing","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10860","display_name":"Speech and Audio Processing","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.8946852684020996},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8660987615585327},{"id":"https://openalex.org/keywords/liveness","display_name":"Liveness","score":0.7959738969802856},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.7117497324943542},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.6511969566345215},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.6023551225662231},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5062128901481628},{"id":"https://openalex.org/keywords/benchmarking","display_name":"Benchmarking","score":0.48901376128196716},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4811035990715027},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3980001211166382},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.32990002632141113},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.31495189666748047},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.16819775104522705}],"concepts":[{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.8946852684020996},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8660987615585327},{"id":"https://openalex.org/C15569618","wikidata":"https://www.wikidata.org/wiki/Q3561421","display_name":"Liveness","level":2,"score":0.7959738969802856},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.7117497324943542},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.6511969566345215},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.6023551225662231},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5062128901481628},{"id":"https://openalex.org/C86251818","wikidata":"https://www.wikidata.org/wiki/Q816754","display_name":"Benchmarking","level":2,"score":0.48901376128196716},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4811035990715027},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3980001211166382},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.32990002632141113},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.31495189666748047},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16819775104522705},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1186/s13635-020-0102-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13635-020-0102-6","pdf_url":"https://jis-eurasipjournals.springeropen.com/track/pdf/10.1186/s13635-020-0102-6","source":{"id":"https://openalex.org/S4210195102","display_name":"EURASIP Journal on Information Security","issn_l":"2510-523X","issn":["2510-523X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Information Security","raw_type":"journal-article"},{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/efdc60cf-4fa1-486e-a7f6-51eb3d382162","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/efdc60cf-4fa1-486e-a7f6-51eb3d382162","pdf_url":null,"source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wright, C & Stewart, D W 2020, 'Understanding visual lip-based biometric authentication for mobile devices', EURASIP Journal on Information Security, vol. 2020, no. 1, 3. https://doi.org/10.1186/s13635-020-0102-6","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:doaj.org/article:afb605ef3119401dbfd0390661b55b1a","is_oa":true,"landing_page_url":"https://doaj.org/article/afb605ef3119401dbfd0390661b55b1a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"EURASIP Journal on Information Security, Vol 2020, Iss 1, Pp 1-16 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13635-020-0102-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13635-020-0102-6","pdf_url":"https://jis-eurasipjournals.springeropen.com/track/pdf/10.1186/s13635-020-0102-6","source":{"id":"https://openalex.org/S4210195102","display_name":"EURASIP Journal on Information Security","issn_l":"2510-523X","issn":["2510-523X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3013140913.pdf","grobid_xml":"https://content.openalex.org/works/W3013140913.grobid-xml"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W1482977908","https://openalex.org/W1531333757","https://openalex.org/W1557636172","https://openalex.org/W1568353806","https://openalex.org/W1924770834","https://openalex.org/W1928419358","https://openalex.org/W1965620683","https://openalex.org/W1979882273","https://openalex.org/W1995046219","https://openalex.org/W1996575884","https://openalex.org/W2071828724","https://openalex.org/W2087681821","https://openalex.org/W2098951409","https://openalex.org/W2141572149","https://openalex.org/W2144513380","https://openalex.org/W2150922807","https://openalex.org/W2159807321","https://openalex.org/W2187089797","https://openalex.org/W2509549781","https://openalex.org/W2550980560","https://openalex.org/W2891205112","https://openalex.org/W2911233953","https://openalex.org/W2962949934","https://openalex.org/W2982360566","https://openalex.org/W3099206234","https://openalex.org/W3148076546"],"related_works":["https://openalex.org/W2965549351","https://openalex.org/W2020816142","https://openalex.org/W4310007307","https://openalex.org/W192788472","https://openalex.org/W2794551535","https://openalex.org/W2040650733","https://openalex.org/W4365211642","https://openalex.org/W2558346698","https://openalex.org/W1584545576","https://openalex.org/W4300118114"],"abstract_inverted_index":{"Abstract":[0],"This":[1],"paper":[2,99,150],"explores":[3],"the":[4,20,32,111,153,179,189,196,204,231],"suitability":[5],"of":[6,22,176,203,208,230,252],"lip-based":[7,83,116,139,158,212],"authentication":[8,18,85,118,159,214],"as":[9,57,94],"a":[10,68,101,105,143,157,163,167,239,249],"behavioural":[11],"biometric":[12,17,84,117,213],"for":[13,50,114,152,188,211,219,259],"mobile":[14,41,144],"devices.":[15],"Lip-based":[16],"is":[19,37,126],"process":[21],"verifying":[23],"an":[24,172],"individual":[25],"based":[26],"on":[27,138,142,178,269],"visual":[28],"information":[29],"taken":[30],"from":[31],"lips":[33],"while":[34],"speaking.":[35],"It":[36],"particularly":[38],"suited":[39],"to":[40,227,264],"devices":[42],"because":[43],"it":[44],"contains":[45],"unique":[46],"information;":[47],"its":[48,77],"potential":[49],"liveness":[51],"over":[52],"existing":[53],"popular":[54],"biometrics":[55,92],"such":[56,93],"face":[58],"and":[59,61,80,132,184,206,215,242,248],"fingerprint":[60],"lip":[62],"movements":[63],"can":[64],"be":[65,136,236],"captured":[66,258],"using":[67,104],"device\u2019s":[69],"front-facing":[70],"camera,":[71],"requiring":[72],"no":[73],"dedicated":[74],"hardware.":[75],"Despite":[76],"potential,":[78],"research":[79,267],"progress":[81],"into":[82],"has":[86],"been":[87],"significantly":[88],"slower":[89],"than":[90],"other":[91,265],"face,":[95],"fingerprints,":[96],"or":[97],"iris.This":[98],"investigates":[100],"state-of-the-art":[102],"approach":[103],"deep":[106],"Siamese":[107],"network,":[108],"trained":[109],"with":[110,119,129,171],"triplet":[112],"loss":[113],"one-shot":[115],"real-world":[120,130],"challenges.":[121],"The":[122,146,222,256],"proposed":[123],"system,":[124],"LipAuth,":[125],"rigourously":[127],"examined":[128],"data":[131,209],"challenges":[133,233],"that":[134,234],"could":[135,235],"expected":[137,237],"solution":[140],"deployed":[141],"device.":[145],"work":[147,190,261],"in":[148,191,238],"this":[149,192,260],"shows":[151],"first":[154],"time":[155],"how":[156],"system":[160],"performs":[161],"beyond":[162],"closed-set":[164],"protocol,":[165],"benchmarking":[166],"new":[168],"open-set":[169],"protocol":[170],"equal":[173],"error":[174],"rates":[175],"1.65%":[177],"XM2VTS":[180],"dataset.New":[181],"datasets,":[182],"qFace":[183],"FAVLIPS,":[185],"were":[186],"collected":[187],"paper,":[193],"which":[194],"push":[195],"field":[197],"forward":[198],"by":[199],"enabling":[200],"systematic":[201],"testing":[202],"content":[205],"quantities":[207],"needed":[210],"highlight":[216],"problematic":[217],"areas":[218],"future":[220],"work.":[221],"FAVLIPS":[223],"dataset":[224],"was":[225],"designed":[226],"mimic":[228],"some":[229],"hardest":[232],"deployment":[240],"scenario":[241],"include":[243],"varied":[244],"spoken":[245],"content,":[246],"miming":[247],"wide":[250],"range":[251],"challenging":[253],"lighting":[254],"conditions.":[255],"datasets":[257],"are":[262],"available":[263],"university":[266],"groups":[268],"request.":[270]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4}],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2025-10-10T00:00:00"}
