Efficient software attack to multimodal biometric systems and its application to face and iris fusion
暂无分享,去创建一个
Julian Fiérrez | Marta Gomez-Barrero | Javier Galbally | Julian Fierrez | Javier Galbally | M. Gomez-Barrero | J. Galbally
[1] Yu Liang,et al. A Method for Face and Iris Feature Fusion in Identity Authentication , 2006 .
[2] Philip R. Cohen,et al. MULTIMODAL INTERFACES THAT PROCESS WHAT COMES NATURALLY , 2000 .
[3] Anil K. Jain,et al. Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.
[4] Patrick J. Flynn,et al. Overview of the face recognition grand challenge , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[5] Zahid Akhtar,et al. Secure Learning Algorithm for Multimodal Biometric Systems against Spoof Attacks , .
[6] R. Kent. Secrets and lies. , 2007, Nursing standard (Royal College of Nursing (Great Britain) : 1987).
[7] V. Kshirsagar,et al. Face recognition using Eigenfaces , 2011, 2011 3rd International Conference on Computer Research and Development.
[8] Libor Masek,et al. MATLAB Source Code for a Biometric Identification System Based on Iris Patterns , 2003 .
[9] Anne Brindle,et al. Genetic algorithms for function optimization , 1980 .
[10] John Daugman. How iris recognition works , 2004 .
[11] Bernadette Dorizzi,et al. Guide to Biometric Reference Systems and Performance Evaluation , 2009 .
[12] Michael Wagner,et al. Audio-visual multimodal fusion for biometric person authentication and liveness verification , 2006 .
[13] Stephanie Schuckers,et al. Multimodal fusion vulnerability to non-zero effort (spoof) imposters , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[14] Tieniu Tan,et al. Combining Face and Iris Biometrics for Identity Verification , 2003, AVBPA.
[15] Julian Fiérrez,et al. Hill-Climbing Attack Based on the Uphill Simplex Algorithm and Its Application to Signature Verification , 2011, BIOID.
[16] Arun Ross,et al. Score normalization in multimodal biometric systems , 2005, Pattern Recognit..
[17] Julian Fiérrez,et al. An evaluation of indirect attacks and countermeasures in fingerprint verification systems , 2011, Pattern Recognit. Lett..
[18] Julian Fiérrez,et al. On the Vulnerability of Iris-Based Systems to a Software Attack Based on a Genetic Algorithm , 2012, CIARP.
[19] John Daugman,et al. How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.
[20] FierrezJulian,et al. Efficient software attack to multimodal biometric systems and its application to face and iris fusion , 2014 .
[21] Jun-Ying Gan,et al. Fusion and recognition of face and iris feature based on wavelet feature and KFDA , 2009, 2009 International Conference on Wavelet Analysis and Pattern Recognition.
[22] Sharon L. Oviatt,et al. Ten myths of multimodal interaction , 1999, Commun. ACM.
[23] Sébastien Marcel,et al. On the vulnerability of face verification systems to hill-climbing attacks , 2010, Pattern Recognit..
[24] Nalini K. Ratha,et al. An Analysis of Minutiae Matching Strength , 2001, AVBPA.
[25] Arun Ross,et al. Information fusion in biometrics , 2003, Pattern Recognit. Lett..
[26] Umut Uludag,et al. Secure biometric systems , 2006 .
[27] A. Adler,et al. Images can be regenerated from quantized biometric match score data , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).
[28] Sharon L. Oviatt,et al. Toward a theory of organized multimodal integration patterns during human-computer interaction , 2003, ICMI '03.
[29] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[30] Xiaobo Zhang,et al. Hierarchical Fusion of Face and Iris for Personal Identification , 2010, 2010 20th International Conference on Pattern Recognition.
[31] Sharon L. Oviatt,et al. Taming recognition errors with a multimodal interface , 2000, CACM.
[32] Julian Fiérrez,et al. Direct Attacks Using Fake Images in Iris Verification , 2008, BIOID.
[33] Zohreh Mousavinasab,et al. Biometric Systems , 2013 .
[34] MarcelSebastien,et al. On the vulnerability of face verification systems to hill-climbing attacks , 2010 .
[35] Andreas Uhl,et al. Attack against Robust Watermarking-Based Multimodal Biometric Recognition Systems , 2011, BIOID.
[36] Julian Fiérrez,et al. Evaluation of direct attacks to fingerprint verification systems , 2011, Telecommun. Syst..
[37] Bozhao Tan,et al. Assessing and reducing spoofing vulnerability for multimodal and fingerprint biometrics , 2009 .
[38] Alejandro F. Frangi,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. , 2022 .
[39] John A. Nelder,et al. A Simplex Method for Function Minimization , 1965, Comput. J..
[40] Venu Govindaraju,et al. Robustness of multimodal biometric fusion methods against spoof attacks , 2009, J. Vis. Lang. Comput..
[41] Tom Gaertner,et al. Biometric Systems Technology Design And Performance Evaluation , 2016 .
[42] Bruce Schneier,et al. Inside risks: the uses and abuses of biometrics , 1999, CACM.
[43] Sharon L. Oviatt,et al. Perceptual user interfaces: multimodal interfaces that process what comes naturally , 2000, CACM.
[44] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[45] Venu Govindaraju,et al. Evaluation of biometric spoofing in a multimodal system , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[46] H. Damasio,et al. IEEE Transactions on Pattern Analysis and Machine Intelligence: Special Issue on Perceptual Organization in Computer Vision , 1998 .
[47] James E. Baker,et al. Reducing Bias and Inefficienry in the Selection Algorithm , 1987, ICGA.