Designing reliable user authentication on mobile phones is becoming an increasingly important task to protect users' private information and data. Since biometric approaches can …
J Yang, Z Lei, SZ Li - arXiv preprint arXiv:1408.5601, 2014 - arxiv.org
Though having achieved some progresses, the hand-crafted texture features, eg, LBP [23], LBP-TOP [11] are still unable to capture the most discriminative cues between genuine and …
L Li, X Feng, Z Boulkenafet, Z Xia, M Li… - … conference on image …, 2016 - ieeexplore.ieee.org
Recently deep Convolutional Neural Networks have been successfully applied in many computer vision tasks and achieved promising results. So some works have introduced the …
In recent decades, we have witnessed the evolution of biometric technology from the first pioneering works in face and voice recognition to the current state of development wherein a …
Face antispoofing has now attracted intensive attention, aiming to assure the reliability of face biometrics. We notice that currently most of face antispoofing databases focus on data …
Face anti-spoofing is essential to prevent face recognition systems from a security breach. Much of the progresses have been made by the availability of face anti-spoofing benchmark …
Face anti-spoofing is essential to prevent face recognition systems from a security breach. Much of the progresses have been made by the availability of face anti-spoofing benchmark …
N Erdogmus, S Marcel - IEEE transactions on information …, 2014 - ieeexplore.ieee.org
Spoofing is the act of masquerading as a valid user by falsifying data to gain an illegitimate access. Vulnerability of recognition systems to spoofing attacks (presentation attacks) is still …
N Erdogmus, S Marcel - 2013 IEEE sixth international …, 2013 - ieeexplore.ieee.org
The problem of detecting face spoofing attacks (presentation attacks) has recently gained a well-deserved popularity. Mainly focusing on 2D attacks forged by displaying printed photos …