J Yang, Z Lei, S Liao, SZ Li - 2013 International Conference on Biometrics (ICB) - infona.pl
Spoofing attacks mainly include printing artifacts, electronic screens and ultra-realistic face
masks or models. In this paper, we propose a component-based face coding approach for …