Deep representations for iris, face, and fingerprint spoofing detection

D Menotti, G Chiachia, A Pinto… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
Biometrics systems have significantly improved person identification and authentication,
playing an important role in personal, national, and global security. However, these systems …

Biometrics systems under spoofing attack: an evaluation methodology and lessons learned

A Hadid, N Evans, S Marcel… - IEEE Signal Processing …, 2015 - ieeexplore.ieee.org
Biometrics already form a significant component of current and emerging identification
technologies. Biometrics systems aim to determine or verify the identity of an individual from …

[图书][B] Handbook of biometric anti-spoofing: Presentation attack detection

S Marcel, MS Nixon, J Fierrez, N Evans - 2019 - Springer
This authoritative and comprehensive handbook is the definitive work on the current state of
the art of Biometric Presentation Attack Detection (PAD)–also known as Biometric Anti …

Face biometrics under spoofing attacks: Vulnerabilities, countermeasures, open issues, and research directions

A Hadid - Proceedings of the IEEE Conference on Computer …, 2014 - cv-foundation.org
Among tangible threats and vulnerabilities facing current biometric systems are spoofing
attacks. A spoofing attack occurs when a person tries to masquerade as someone else by …

Convolutional neural networks for iris presentation attack detection: Toward cross-dataset and cross-sensor generalization

S Hoffman, R Sharma, A Ross - Proceedings of the IEEE …, 2018 - openaccess.thecvf.com
Iris recognition systems are vulnerable to presentation attacks where an adversary employs
artifacts such as 2D prints of the eye, plastic eyes, and cosmetic contact lenses to obfuscate …

Biometrics evaluation under spoofing attacks

I Chingovska, AR Dos Anjos… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
While more accurate and reliable than ever, the trustworthiness of biometric verification
systems is compromised by the emergence of spoofing attacks. Responding to this threat …

Generalizing fingerprint spoof detector: Learning a one-class classifier

JJ Engelsma, AK Jain - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
Prevailing fingerprint recognition systems are vulnerable to spoof attacks. To mitigate these
attacks, automated spoof detectors are trained to distinguish a set of live or bona fide …

Biometric antispoofing methods: A survey in face recognition

J Galbally, S Marcel, J Fierrez - IEEE Access, 2014 - ieeexplore.ieee.org
In recent decades, we have witnessed the evolution of biometric technology from the first
pioneering works in face and voice recognition to the current state of development wherein a …

An approach to iris contact lens detection based on deep image representations

P Silva, E Luz, R Baeta, H Pedrini… - 2015 28th SIBGRAPI …, 2015 - ieeexplore.ieee.org
Spoofing detection is a challenging task in biometric systems, when differentiating
illegitimate users from genuine ones. Although iris scans are far more inclusive than …

Face antispoofing using speeded-up robust features and fisher vector encoding

Z Boulkenafet, J Komulainen… - IEEE Signal Processing …, 2016 - ieeexplore.ieee.org
The vulnerabilities of face biometric authentication systems to spoofing attacks have
received a significant attention during the recent years. Some of the proposed …