dc.creator | De Freitas Pereira T. | |
dc.creator | Anjos A. | |
dc.creator | De Martino J.M. | |
dc.creator | Marcel S. | |
dc.date | 2013 | |
dc.date | 2015-06-25T19:13:36Z | |
dc.date | 2015-11-26T15:11:10Z | |
dc.date | 2015-06-25T19:13:36Z | |
dc.date | 2015-11-26T15:11:10Z | |
dc.date.accessioned | 2018-03-28T22:21:16Z | |
dc.date.available | 2018-03-28T22:21:16Z | |
dc.identifier | 9781479903108 | |
dc.identifier | Proceedings - 2013 International Conference On Biometrics, Icb 2013. Ieee Computer Society, v. , n. , p. - , 2013. | |
dc.identifier | | |
dc.identifier | 10.1109/ICB.2013.6612981 | |
dc.identifier | http://www.scopus.com/inward/record.url?eid=2-s2.0-84887421388&partnerID=40&md5=2dd85acfa629e30f228e23128156e51e | |
dc.identifier | http://www.repositorio.unicamp.br/handle/REPOSIP/88901 | |
dc.identifier | http://repositorio.unicamp.br/jspui/handle/REPOSIP/88901 | |
dc.identifier | 2-s2.0-84887421388 | |
dc.identifier.uri | http://repositorioslatinoamericanos.uchile.cl/handle/2250/1258069 | |
dc.description | User authentication is an important step to protect information and in this field face biometrics is advantageous. Face biometrics is natural, easy to use and less human-invasive. Unfortunately, recent work has revealed that face biometrics is vulnerable to spoofing attacks using low-tech equipments. This article assesses how well existing face anti-spoofing countermeasures can work in a more realistic condition. Experiments carried out with two freely available video databases (Replay Attack Database and CASIA Face Anti-Spoofing Database) show low generalization and possible database bias in the evaluated countermeasures. To generalize and deal with the diversity of attacks in a real world scenario we introduce two strategies that show promising results. © 2013 IEEE. | |
dc.description | | |
dc.description | | |
dc.description | | |
dc.description | | |
dc.description | Cognitec,European FP7 Project Tabula Rasa,Safran-Morpho,Telefonica (Through Catedra UAM-Telefonica),Thales | |
dc.description | Flynn, P., Jain, A., Ross, A., (2008) Handbook of Biometrics, , Springer | |
dc.description | Li, S., Jain, A., (2011) Handbook of Face Recognition, , Springer | |
dc.description | Duc, M.B.Q., Your face is not your password (2009) Black Hat Conference | |
dc.description | Uludag, U., Jain, A., Attacks on biometric systems: A case study in fingerprints (2004) Proc. SPIE-EI, pp. 622-633 | |
dc.description | Leyden, J., Gummi bears defeat fingerprint sensors (2002) The Register, 16 | |
dc.description | Johnson, P., Tan, B., Schuckers, S., Multimodal fusion vulnerability to non-zero effort (spoof) imposters (2010) Information Forensics and Security (WIFS), 2010 IEEE International Workshop on, pp. 1-5. , IEEE | |
dc.description | Kanematsu, M., Takano, H., Nakamura, K., Highly reliable liveness detection method for iris recognition (2007) SICE, 2007 Annual Conference, pp. 361-364. , IEEE | |
dc.description | Tan, X., Li, Y., Liu, J., Jiang, L., Face liveness detection from a single image with sparse low rank bilinear discriminative model (2010) Computer Vision-ECCV 2010, pp. 504-517 | |
dc.description | Zhang, Z., Yan, J., Liu, S., Lei, Z., Yi, D., Li, S., A face antispoofing database with diverse attacks (2012) Biometrics (ICB), 2012 5th IAPR International Conference on Biometrics, pp. 26-31. , IEEE | |
dc.description | Chingovska, I., Anjos, A., Marcel, S., On the effectiveness of local binary patterns in face anti-spoofing (2012) IEEE BIOSIG 2012, , Sept | |
dc.description | Chakka, M., Anjos, A., Marcel, S., Tronci, R., Competition on counter measures to 2-d facial spoofing attacks (2011) Proceedings of IAPR IEEE International Joint Conference on Biometrics (IJCB), , Washington DC, USA, Oct | |
dc.description | Pan, G., Sun, L., Wu, Z., Lao, S., Eyeblink-based antispoofing in face recognition from a generic webcamera (2007) Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on Computer Vision, pp. 1-8. , IEEE | |
dc.description | Kollreider, K., Fronthaler, H., Bigun, J., Non-intrusive liveness detection by face images (2009) Image and Vision Computing, 27 (3), pp. 233-244 | |
dc.description | Anjos, A., Marcel, S., Counter-measures to photo attacks in face recognition: A public database and a baseline (2011) International Joint Conference on Biometrics 2011, , Oct | |
dc.description | Li, J., Wang, Y., Tan, T., Jain, A., Live face detection based on the analysis of fourier spectra (2004) Biometric Technology for Human Identification, 5404, pp. 296-303 | |
dc.description | Maatta, J., Hadid, A., Pietikaandinen, M., Face spoofing detection from single images using texture and local shape analysis (2012) Biometrics, IET, 1, pp. 3-10. , march | |
dc.description | Trefny, J., Matas, J., Extended set of local binary patterns for rapid object detection (2010) Proceedings of the Computer Vision Winter Workshop, 2010 | |
dc.description | De Freitas Pereira, T., Anjos, A., De Martino, J.M., Marcel, S., LBP-TOP based countermeasure against facial spoofing attacks (2012) International Workshop on Computer Vision with Local Binary Pattern Variants - ACCV, , Nov | |
dc.description | Anjos, A., Shafey, L.E., Wallace, R., Günther, M., Mc-Cool, C., Marcel, S., Bob: A free signal processing and machine learning toolbox for researchers (2012) 20th ACM Conference on Multimedia Systems (ACMMM), , Nara, Japan, ACM Press, Oct | |
dc.description | Froba, B., Ernst, A., Face detection with the modified census transform (2004) Automatic Face and Gesture Recognition, 2004. Proceedings. Sixth IEEE International Conference on, pp. 91-96. , IEEE | |
dc.description | Komulainen, H.A.P.M.J., Face spoofing detection using dynamic texture (2012) International Workshop on Computer Vision with Local Binary Pattern Variants - ACCV, , Nov | |
dc.description | Kuncheva, L.I., Whitaker, C.J., Measures of diversity in classifier ensembles and their relationship with the ensemble accuracy (2003) Mach. Learn., 51, pp. 181-207. , May | |
dc.language | en | |
dc.publisher | IEEE Computer Society | |
dc.relation | Proceedings - 2013 International Conference on Biometrics, ICB 2013 | |
dc.rights | fechado | |
dc.source | Scopus | |
dc.title | Can Face Anti-spoofing Countermeasures Work In A Real World Scenario? | |
dc.type | Actas de congresos | |