Spoofing and countermeasures for speaker verification: A survey

Z Wu, N Evans, T Kinnunen, J Yamagishi, F Alegre… - speech …, 2015 - Elsevier
While biometric authentication has advanced significantly in recent years, evidence shows
the technology can be susceptible to malicious spoofing attacks. The research community …

A comprehensive overview of biometric fusion

M Singh, R Singh, A Ross - Information Fusion, 2019 - Elsevier
The performance of a biometric system that relies on a single biometric modality (eg,
fingerprints only) is often stymied by various factors such as poor data quality or limited …

Face spoofing detection using colour texture analysis

Z Boulkenafet, J Komulainen… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Research on non-intrusive software-based face spoofing detection schemes has been
mainly focused on the analysis of the luminance information of the face images, hence …

Learn convolutional neural network for face anti-spoofing

J Yang, Z Lei, SZ Li - arXiv preprint arXiv:1408.5601, 2014 - arxiv.org
Though having achieved some progresses, the hand-crafted texture features, eg, LBP [23],
LBP-TOP [11] are still unable to capture the most discriminative cues between genuine and …

Biometric antispoofing methods: A survey in face recognition

J Galbally, S Marcel, J Fierrez - Ieee Access, 2014 - ieeexplore.ieee.org
In recent decades, we have witnessed the evolution of biometric technology from the first
pioneering works in face and voice recognition to the current state of development wherein a …

On joint optimization of automatic speaker verification and anti-spoofing in the embedding space

A Gomez-Alanis, JA Gonzalez-Lopez… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Biometric systems are exposed to spoofing attacks which may compromise their security,
and voice biometrics based on automatic speaker verification (ASV), is no exception. To …

Biometrics evaluation under spoofing attacks

I Chingovska, AR Dos Anjos… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
While more accurate and reliable than ever, the trustworthiness of biometric verification
systems is compromised by the emergence of spoofing attacks. Responding to this threat …

Joint Speaker Verification and Antispoofing in the -Vector Space

A Sizov, E Khoury, T Kinnunen, Z Wu… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Any biometric recognizer is vulnerable to spoofing attacks and hence voice biometric, also
called automatic speaker verification (ASV), is no exception; replay, synthesis, and …

On the vulnerability of finger vein recognition to spoofing

P Tome, M Vanoni, S Marcel - 2014 international conference of …, 2014 - ieeexplore.ieee.org
The vulnerability of finger vein recognition to spoofing is studied in this paper. A collection of
spoofing finger vein images has been created from real finger vein samples. Finger vein …

Person-specific face antispoofing with subject domain adaptation

J Yang, Z Lei, D Yi, SZ Li - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
Face antispoofing is important to practical face recognition systems. In previous works, a
generic antispoofing classifier is trained to detect spoofing attacks on all subjects. However …