Publications 2008

J. Zuo and N. A. Schmid, “On a Methodology for Robust Segmentation of Non-Ideal Iris Images,” for publication in the IEEE Trans. on System, Man, and Cybernetics, Part B, Acceptance Letter is dated by Sept. 26, 2008.

A. Ross and R. Nadgir, “A Thin-plate Spline Calibration Model For Fingerprint Sensor Interoperability,” IEEE Transactions on Knowledge and Data Engineering, Special Issue on Intelligence and Security Informatics, Vol. 20, No. 8, pp. 1097-1110, August 2008.

Tan B. and Schuckers S, “A New Approach for Liveness Detection in Fingerprint Scanners Based on Valley Noise Analysis“, Journal of Electronic Imaging, Vol. 17, No. 1, pp. 011009-1 to 011009-9, 2008.

Schuckers, M.E., “Theoretical Statistical Correlation For Biometric Identification Performance” in Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP), (2008).

Diaa E. Nassar, A. Abaza, Xin Li, and H. Ammar, “Automatic Construction of Dental Charts for Post-Mortem Identification“, IEEE Trans. On Forensics and Security, (2008).

F. Nicolo and N. A. Schmid, “Empirical Capacity of a Biometric Channel under the Constraint of Global PCA and ICA Encoding“, ICASSP 2008, Las Vegas Nevada, (2008).

Y. C. Feng, P. C. Yuen, and A. K. Jain, “A Hybrid Approach for Face Template Protection“, Proc. of SPIE Conference of Biometric Technology for Human Identification V, Vol. 6944, Orlando, (2008).

U. Park, S. Pankanti, and A. K. Jain, “Fingerprint Verification Using SIFT Features“, Proc. of SPIE Conference of Biometric Technology for Human Identification V, Vol. 6944, Orlando, (2008).

K. Nandakumar, Y. Chen, S. C. Dass, and A. K. Jain, “Likelihood Ratio Based Biometric Score Fusion“, IEEE Trans. Pattern Analysis and Machine Intelligence, p. 342, vol. 30, (2008).

A. K. Jain, K. Nandakumar, and A. Nagar, “Biometric Template Security“, EURASIP Journal on Advances in Signal Processing, Special Issue on Advanced Signal Processing and Pattern Recognition Methods for Biometrics, (2008).

A. Nagar, K. Nandakumar, and A. K. Jain, “Securing Fingerprint Template: Fuzzy Vault with Minutiae Descriptors“, Proc. ICPR, Dec., 2008.

U. Park, Y. Tong, and A. K. Jain, “Face Recognition with Temporal Invariance: A 3D Aging Model“, 8th IEEE Int’l Conference on Automatic Face and Gesture Recognition (FGR), Amsterdam, Netherlands, September, 2008.

K. Nandakumar and A. K. Jain, “Multibiometric Template Security Using Fuzzy Vault“, Biometrics: Theory, Applications and Systems (BTAS08), Sept. 29-Oct. 1, Crystal City, 2008.

J-E. Lee, A. K. Jain, and R. Jin, “Scars, Marks and Tattoos (SMT): Soft Biometric for Suspect and Victim Identification“, Proc. Biometric Symposium, Biometric Consortium Conference, 2008.

J-E. Lee, R. Jin, and A. K. Jain, “Rank-based Distance Metric Learning: An Application to Image Retrieval“, Proc. Computer Vision and Pattern Recognition (CVPR), Alaska, June 2008.

J. Zuo and N. A. Schmid, “An Automatic Algorithm for Evaluation of Precision of Iris Segmentation“, In Proc. of the 2nd Intern. Conf. on Biometrics: Theory, Applications, and Systems (BTAS), Washington DC, Sept. 29 2008-Oct. 1 2008, page(s):1 – 6.

R. Mukherjee and A. Ross, “Indexing Iris Images“, Proc. of International Conference on Pattern Recognition (ICPR), (Tampa, USA), December 2008.

M. Vatsa, R. Singh, A. Ross, and A. Noore, “Likelihood Ratio in a SVM Framework: Fusing Linear and Non- Linear Classifiers“, Proc. IEEE Computer Society Workshop on Biometrics at Computer Vision and Pattern Recognition Conference, pp. 1-6, 2008.

Allspach, L., and Burgoon, J. K., Applied Interpersonal Communication: Behaviors that Affect Outcomes, (2008). Editor(s): M. Motley, Handbook of Interpersonal Communication  Sage, Thousand Oaks, CA.

Burgoon, J. K., “Interpersonal adaptation theory”, International Encyclopedia of Communication, (2008).

Burgoon, J. K., Blair, J. P., and Strom, R., “Cognitive Biases and Nonverbal Cue Availability in Detecting Deception“, Human Communication Research, (2008).

Burgoon, J. K., and Hamel, L., “Deceptive message production”, International Encyclopedia of Communication, (2008). Wiley-Blackwell.

Burgoon, J.K., Derrick, D. C., Elkins, A. C., Humphreys, S. L., Jensen, M. L., Diller, C. B. R. and Nunamaker, J. F. “Potential Noncontact Tools for Rapid Credibility Assessment from Physiological and Behavioral Cues“, (2008). Conference Paper, IEEE international Carnahan Conference on Security Technology  Prague.

Crews, J., Lin, M., Burgoon, J., and Nunamaker, J., “An Empirical Investigation of Virtual Interaction, ACM Database Transactions”, ACM Database Transactions, (2008).

George, J., Biros, D., Burgoon, J., Nunamaker, J. F., Crews, J., Cao, J., Marrett, Adkins, M. Kruse, J., and Lin, M., “Defeating Deception through E-Training”, MISQ Executive, (2008).

Jensen, M. L. “A Hybrid Expert System for Credibility Assessment”, (2008). Presentation, presented at the Frontiers in Information Technology and Applications, (FITA), Tucson, AZ.

Jensen, M. L. “Computer-Aided Multimodal Credibility Assessment”, (2008). Presentation, presented to graduate students and faculty of the Computer Science and Information Systems, The University of Colorado at Denver, Denver, CO.

Jensen, M. L. “Deception, Credibility, and Information Quality”, (2008). Presentation, presented to the IS/OR faculty,  University of North Texas.

Jensen, M. L., Burgoon, J. K., and Nunamaker, J. F., Jr. “A Brunswikian Lens Approach for Automatic, Multimodal Deception Detection”, (2008). Conference paper, International Communication Association Meeting,  Montreal, Canada.

Jensen, M.L., Burgoon, J. K., and Nunamaker, J. F. “User Experiences with an Unobtrusive Decision Aid for Deception Detection“, (2008). IEEE international Carnahan Conference on Security Technology Prague.

Meservy, T., and Burgoon, J. K., “Paralanguage”, International Encyclopedia of Communication, (2008). Wiley-Blackwell.

Meservy, T., Jensen, M. L., Burgoon, J. K., and Nunamaker, J. F., Jr., “Automatic Extraction of Deceptive Behavioral Cues from Video in Terrorism Informatics“, (2008). Chapter, Submitted. Editor(s): H. Chen, E. Reid, J. Sinai, A. Silke, B. Ganor, and K. Joslin  Knowledge Management and Data Mining for Homeland Security.

Miczo, N., and Burgoon, J. K., “Face work and nonverbal behavior in social support interactions among romantic dyads”, (2008). Chapter, Editor(s): M. Motley, Applied Interpersonal Communication: Behaviors that Affect Outcomes, Sage Publications, Thousand Oaks, CA.

Nunamaker, J. F., and Jensen, M. L. “Automated Nonverbal Indicators of Deceit: Automation and Theory”, (2008). Presentation, presented at JASON 2008 Summer Study, Badguyology, La Jolla, CA.

Zhou, L., Burgoon, J. K., Twitchell, D. P., Qin, T., and Nunamaker, J. F., Jr., “Towards the automatic prediction of deception: An empirical comparison of classification methods”, Journal of Management Information Systems, (2008).