Using visual rhythms for detecting video-based facial spoof attacks

A Pinto, WR Schwartz, H Pedrini… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
Spoofing attacks or impersonation can be easily accomplished in a facial biometric system
wherein users without access privileges attempt to authenticate themselves as valid users …

[PDF][PDF] Using Visual Rhythms for Detecting Video-based Facial Spoof Attacks

A Pinto, WR Schwartz, H Pedrini, A Rocha - allansp84.github.io
Spoofing attacks or impersonation can be easily accomplished in a facial biometric system
wherein users without access privileges attempt to authenticate themselves as valid users …

Using Visual Rhythms for Detecting Video-Based Facial Spoof Attacks

A Pinto, WR Schwartz, H Pedrini… - IEEE Transactions on …, 2015 - bv.fapesp.br
Spoofing attacks or impersonation can be easily accomplished in a facial biometric system
wherein users without access privileges attempt to authenticate themselves as valid users …

[PDF][PDF] Using Visual Rhythms for Detecting Video-based Facial Spoof Attacks

A Pinto, WR Schwartz, H Pedrini, A Rocha - researchgate.net
Spoofing attacks or impersonation can be easily accomplished in a facial biometric system
wherein users without access privileges attempt to authenticate themselves as valid users …

Using Visual Rhythms for Detecting Video-Based Facial Spoof Attacks

A Pinto, W Robson Schwartz, H Pedrini… - IEEE Transactions on …, 2015 - dl.acm.org
Spoofing attacks or impersonation can be easily accomplished in a facial biometric system
wherein users without access privileges attempt to authenticate themselves as valid users …

[PDF][PDF] Using Visual Rhythms for Detecting Video-based Facial Spoof Attacks

A Pinto, WR Schwartz, H Pedrini, A Rocha - 2015 - pfigshare-u-files.s3.amazonaws.com
Recent advances on biometrics, information forensics, and security have improved the
accuracy of biometric systems, mainly those based on facial information. However, an ever …

Using Visual Rhythms for Detecting Video-Based Facial Spoof Attacks

A Pinto, WR Schwartz, H Pedrini… - IEEE Transactions on …, 2015 - infona.pl
Spoofing attacks or impersonation can be easily accomplished in a facial biometric system
wherein users without access privileges attempt to authenticate themselves as valid users …

Using Visual Rhythms for Detecting Video-Based Facial Spoof Attacks

A Pinto, WR Schwartz, H Pedrini… - IEEE Transactions on …, 2015 - infona.pl
Spoofing attacks or impersonation can be easily accomplished in a facial biometric system
wherein users without access privileges attempt to authenticate themselves as valid users …