Image-based object spoofing detection

V Costa, A Sousa, A Reis - International Workshop on Combinatorial …, 2018 - Springer
Using 2D images in authentication systems raises the question of spoof attacks: is it possible
to deceive an authentication system using fake models possessing identical visual …

An Attention-Guided Framework for Explainable Biometric Presentation Attack Detection

S Pan, S Hoque, F Deravi - Sensors, 2022 - mdpi.com
Despite the high performances achieved using deep learning techniques in biometric
systems, the inability to rationalise the decisions reached by such approaches is a …

Action-independent generalized behavioral identity descriptors for look-alike recognition in videos

A Khodabakhsh, H Loiselle - 2020 International Conference of …, 2020 - ieeexplore.ieee.org
There is a long history of exploitation of the visual similarity of look-alikes for fraud and
deception. The visual similarity along with the application of physical and digital cosmetics …