Now showing items 1-10 of 30
How far did we get in face spoofing detection?
(Elsevier B.V., 2018-06-01)
The growing use of control access systems based on face recognition shed light over the need for even more accurate systems to detect face spoofing attacks. In this paper, an extensive analysis on face spoofing detection ...
On the Learning of Deep Local Features for Robust Face Spoofing Detection
Biometrics emerged as a robust solution for security systems. However, given the dissemination of biometric applications, criminals are developing techniques to circumvent them by simulating physical or behavioral traits ...
Deep Texture Features for Robust Face Spoofing Detection
Biometric systems are quite common in our everyday life. Despite the higher difficulty to circumvent them, nowadays criminals are developing techniques to accurately simulate physical, physiological, and behavioral traits ...
A comparative study of countermeasures to detect spoofing attacks in face authentication systems = Um estudo comparativo de contramedidas para detectar ataques de spoofing em sistemas de autenticação de facesUm estudo comparativo de contramedidas para detectar ataques de spoofing em sistemas de autenticação de faces
Efficient transfer learning for robust face spoofing detection
Biometric systems are synonym of security. However, nowadays, criminals are violating them by presenting forged traits, such as facial photographs, to fool their capture sensors (spoofing attacks). In order to detect such ...
Efficient width-extended convolutional neural network for robust face spoofing detection
Biometrics has been increasingly used as a safe and convenient technique for people identification. Despite the higher security of biometric systems, criminals have already developed methods to circumvent them, being the ...
A restricted boltzmann machine-based approach for robust dimensionality reduction
Data dimensionality is an important issue to be adressed by pattern recognition systems. Despite of storage and processing, working with high-dimensional feature vectors also requires complex optimization methods. A proper ...
Robustness of multimodal biometric fusion methods against spoof attacks
(Academic Press Ltd- Elsevier Science LtdLondonInglaterra, 2009)
Using Visual Rhythms For Detecting Video-based Facial Spoof Attacks
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCPISCATAWAY, 2015)