Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It covers many different areas of a …
In recent decades, we have witnessed the evolution of biometric technology from the first pioneering works in face and voice recognition to the current state of development wherein a …
B Biggio, G Fumera, F Roli - IEEE transactions on knowledge …, 2013 - ieeexplore.ieee.org
Pattern classification systems are commonly used in adversarial applications, like biometric authentication, network intrusion detection, and spam filtering, in which data can be …
E Marasco, A Ross - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Several issues related to the vulnerability of fingerprint recognition systems to attacks have been highlighted in the biometrics literature. One such vulnerability involves the use of …
Designing reliable user authentication on mobile phones is becoming an increasingly important task to protect users' private information and data. Since biometric approaches can …
T Chugh, K Cao, AK Jain - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
The primary purpose of a fingerprint recognition system is to ensure a reliable and accurate user authentication, but the security of the recognition system itself can be jeopardized by …
N Erdogmus, S Marcel - IEEE transactions on information …, 2014 - ieeexplore.ieee.org
Spoofing is the act of masquerading as a valid user by falsifying data to gain an illegitimate access. Vulnerability of recognition systems to spoofing attacks (presentation attacks) is still …
N Erdogmus, S Marcel - 2013 IEEE sixth international …, 2013 - ieeexplore.ieee.org
The problem of detecting face spoofing attacks (presentation attacks) has recently gained a well-deserved popularity. Mainly focusing on 2D attacks forged by displaying printed photos …
In this paper, we propose a novel framework leveraging the advantages of the representational ability of deep learning and domain generalization for face spoofing …