B Peixoto, C Michelassi, A Rocha - 2011 18th IEEE …, 2011 - ieeexplore.ieee.org
Spoofing face recognition systems with photos or videos of someone else is not difficult. Sometimes, all one needs is to display a picture on a laptop monitor or a printed photograph …
S Kim, S Yu, K Kim, Y Ban, S Lee - … International Conference on …, 2013 - ieeexplore.ieee.org
As Face Recognition (FR) technology becomes more mature and commercially available in the market, many different anti-spoofing techniques have been recently developed to …
Face recognition, which is security-critical, has been widely deployed in our daily life. However, traditional face recognition technologies in practice can be spoofed easily, for …
The recent literature on face recognition technology discusses the issue of face spoofing which can bypass the authentication system by placing a photo/video/mask of the enrolled …
Face biometric systems are vulnerable to spoofing attacks. Such attacks can be performed in many ways, including presenting a falsified image, video or 3D mask of a valid user. A …
The proposed system aims to boost the performance of a face anti-spoofing system by fusing pulse based features with other spatial and temporal information that markedly define …
S Kumar, S Singh, J Kumar - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
In the last 57 years, face biometrie researchers have achieved many successes. Face recognition systems have been extensively used in government as well as commercial …
In recent years face recognition systems have been applied in various useful applications, such as surveillance, access control, criminal investigations, law enforcement, and others …
A Hadid - Proceedings of the IEEE Conference on Computer …, 2014 - cv-foundation.org
Among tangible threats and vulnerabilities facing current biometric systems are spoofing attacks. A spoofing attack occurs when a person tries to masquerade as someone else by …