The performance of a biometric system that relies on a single biometric modality (eg, fingerprints only) is often stymied by various factors such as poor data quality or limited …
Research on non-intrusive software-based face spoofing detection schemes has been mainly focused on the analysis of the luminance information of the face images, hence …
J Yang, Z Lei, SZ Li - arXiv preprint arXiv:1408.5601, 2014 - arxiv.org
Though having achieved some progresses, the hand-crafted texture features, eg, LBP [23], LBP-TOP [11] are still unable to capture the most discriminative cues between genuine and …
In recent decades, we have witnessed the evolution of biometric technology from the first pioneering works in face and voice recognition to the current state of development wherein a …
Biometric systems are exposed to spoofing attacks which may compromise their security, and voice biometrics based on automatic speaker verification (ASV), is no exception. To …
While more accurate and reliable than ever, the trustworthiness of biometric verification systems is compromised by the emergence of spoofing attacks. Responding to this threat …
Any biometric recognizer is vulnerable to spoofing attacks and hence voice biometric, also called automatic speaker verification (ASV), is no exception; replay, synthesis, and …
P Tome, M Vanoni, S Marcel - 2014 international conference of …, 2014 - ieeexplore.ieee.org
The vulnerability of finger vein recognition to spoofing is studied in this paper. A collection of spoofing finger vein images has been created from real finger vein samples. Finger vein …
J Yang, Z Lei, D Yi, SZ Li - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
Face antispoofing is important to practical face recognition systems. In previous works, a generic antispoofing classifier is trained to detect spoofing attacks on all subjects. However …