Biometrics evaluation under spoofing attacks

I Chingovska, AR Dos Anjos… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
While more accurate and reliable than ever, the trustworthiness of biometric verification
systems is compromised by the emergence of spoofing attacks. Responding to this threat …

Anti-spoofing in action: joint operation with a verification system

I Chingovska, A Anjos, S Marcel - Proceedings of the IEEE …, 2013 - cv-foundation.org
Besides the recognition task, today's biometric systems need to cope with additional
problem: spoofing attacks. Up to date, academic research considers spoofing as a binary …

Face biometrics under spoofing attacks: Vulnerabilities, countermeasures, open issues, and research directions

A Hadid - Proceedings of the IEEE Conference on Computer …, 2014 - cv-foundation.org
Among tangible threats and vulnerabilities facing current biometric systems are spoofing
attacks. A spoofing attack occurs when a person tries to masquerade as someone else by …

Face recognition under spoofing attacks: countermeasures and research directions

L Li, PL Correia, A Hadid - Iet Biometrics, 2018 - Wiley Online Library
Among tangible threats facing current biometric systems are spoofing attacks. A spoofing
attack occurs when a person tries to masquerade as someone else by falsifying data and …

Biometric antispoofing methods: A survey in face recognition

J Galbally, S Marcel, J Fierrez - Ieee Access, 2014 - ieeexplore.ieee.org
In recent decades, we have witnessed the evolution of biometric technology from the first
pioneering works in face and voice recognition to the current state of development wherein a …

Biometrics systems under spoofing attack: an evaluation methodology and lessons learned

A Hadid, N Evans, S Marcel… - IEEE Signal Processing …, 2015 - ieeexplore.ieee.org
Biometrics already form a significant component of current and emerging identification
technologies. Biometrics systems aim to determine or verify the identity of an individual from …

Face antispoofing using speeded-up robust features and fisher vector encoding

Z Boulkenafet, J Komulainen… - IEEE Signal Processing …, 2016 - ieeexplore.ieee.org
The vulnerabilities of face biometric authentication systems to spoofing attacks have
received a significant attention during the recent years. Some of the proposed …

On the use of client identity information for face antispoofing

I Chingovska, AR Dos Anjos - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
With biometrics playing the role of a password which cannot be replaced if stolen, the
necessity of establishing counter-measures to biometric spoofing attacks has been …

Spoofing attack detection by anomaly detection

S Fatemifar, SR Arashloo, M Awais… - ICASSP 2019-2019 …, 2019 - ieeexplore.ieee.org
Spoofing attacks on biometric systems can seriously compromise their practical utility. In this
paper we focus on face spoofing detection. The majority of papers on spoofing attack …

Face anti-spoofing: Visual approach

A Anjos, J Komulainen, S Marcel, A Hadid… - Handbook of Biometric …, 2014 - Springer
User authentication is an important step to protect information and in this regard face
biometrics is advantageous. Face biometrics is natural, easy to use and less human …