Protection of 2D face identification systems against spoofing attacks. (Protection des systèmes d'identification faciale face à la fraude par présentation de leurres)
暂无分享,去创建一个
[1] Liming Chen,et al. Multi-scale Color Local Binary Patterns for Visual Object Classes Recognition , 2010, 2010 20th International Conference on Pattern Recognition.
[2] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[3] Shengcai Liao,et al. Face liveness detection using 3D structure recovered from a single camera , 2013, 2013 International Conference on Biometrics (ICB).
[4] Jukka Komulainen,et al. Face Spoofing Detection Using Dynamic Texture , 2012, ACCV Workshops.
[5] Kang Ryoung Park,et al. Face liveness detection based on texture and frequency analyses , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[6] Alvin F. Martin,et al. The DET curve in assessment of detection task performance , 1997, EUROSPEECH.
[7] Jukka Komulainen,et al. The 2nd competition on counter measures to 2D face spoofing attacks , 2013, 2013 International Conference on Biometrics (ICB).
[8] Sébastien Marcel,et al. Anti-spoofing in Action: Joint Operation with a Verification System , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops.
[9] Nguyen Minh Duc. Your face is NOT your password Face Authentication ByPassing Lenovo – Asus – Toshiba , 2009 .
[10] Zhenhua Guo,et al. A Completed Modeling of Local Binary Pattern Operator for Texture Classification , 2010, IEEE Transactions on Image Processing.
[11] Xiaoyang Tan,et al. Enhanced Local Texture Feature Sets for Face Recognition Under Difficult Lighting Conditions , 2007, AMFG.
[12] V. Bhagavatula. Real-Time Face Detection and Motion Analysis With Application in "Liveness" Assessment , 2007 .
[13] Anderson Rocha,et al. Using Visual Rhythms for Detecting Video-Based Facial Spoof Attacks , 2015, IEEE Transactions on Information Forensics and Security.
[14] Abdenour Hadid,et al. Face spoofing detection using local binary patterns and Fisher Score , 2015, 2015 3rd International Conference on Control, Engineering & Information Technology (CEIT).
[15] Michael Elad,et al. A Variational Framework for Retinex , 2002, IS&T/SPIE Electronic Imaging.
[16] Mohamed N. Ahmed,et al. Characterization of Electrophotographic Print Artifacts: Banding, Jitter, and Ghosting , 2011, IEEE Transactions on Image Processing.
[17] N. Kose,et al. Classification of captured and recaptured images to detect photograph spoofing , 2012, 2012 International Conference on Informatics, Electronics & Vision (ICIEV).
[18] Matti Pietikäinen,et al. Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[19] Robert M. Haralick,et al. Textural Features for Image Classification , 1973, IEEE Trans. Syst. Man Cybern..
[20] Tian-Tsong Ng,et al. Recaptured photo detection using specularity distribution , 2008, 2008 15th IEEE International Conference on Image Processing.
[21] Anderson Rocha,et al. Face spoofing detection through partial least squares and low-level descriptors , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[22] Francesco Bianconi,et al. Evaluation of the effects of Gabor filter parameters on texture classification , 2007, Pattern Recognit..
[23] Patricia Ladret,et al. The blur effect: perception and estimation with a new no-reference perceptual blur metric , 2007, Electronic Imaging.
[24] Matti Pietikäinen,et al. Competition on counter measures to 2-D facial spoofing attacks , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[25] Yiannis S. Boutalis,et al. FCTH: Fuzzy Color and Texture Histogram - A Low Level Feature for Accurate Image Retrieval , 2008, 2008 Ninth International Workshop on Image Analysis for Multimedia Interactive Services.
[26] Jean-Luc Dugelay,et al. Shape and Texture Based Countermeasure to Protect Face Recognition Systems against Mask Attacks , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops.
[27] Ngoc-Son Vu. Towards unconstrained face recognition from one sample. (Contributions à la reconnaissance de visages à partir d'une seule image et dans un contexte non-contrôlé) , 2010 .
[28] David A Clausi. An analysis of co-occurrence texture statistics as a function of grey level quantization , 2002 .
[29] Ayan Chakrabarti,et al. An Empirical Camera Model for Internet Color Vision , 2009, BMVC.
[30] Colin Soutar. Implementation of Biometric Systems - Security and Privacy Considerations , 2002, Inf. Secur. Tech. Rep..
[31] Stan Z. Li,et al. Person-Specific Face Antispoofing With Subject Domain Adaptation , 2015, IEEE Transactions on Information Forensics and Security.
[32] Anderson Rocha,et al. Video-Based Face Spoofing Detection through Visual Rhythm Analysis , 2012, 2012 25th SIBGRAPI Conference on Graphics, Patterns and Images.
[33] Thomas Mensink,et al. Improving the Fisher Kernel for Large-Scale Image Classification , 2010, ECCV.
[34] Sébastien Marcel,et al. Handbook of Biometric Anti-Spoofing , 2019, Advances in Computer Vision and Pattern Recognition.
[35] Yi Li,et al. Face Liveness Detection from a Single Image with Sparse Low Rank Bilinear Discriminative Model , 2010, ECCV.
[36] David J. Kriegman,et al. Visual tracking and recognition using probabilistic appearance manifolds , 2005, Comput. Vis. Image Underst..
[37] Leen-Kiat Soh,et al. Texture analysis of SAR sea ice imagery using gray level co-occurrence matrices , 1999, IEEE Trans. Geosci. Remote. Sens..
[38] Florent Perronnin,et al. Fisher Kernels on Visual Vocabularies for Image Categorization , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[39] Sébastien Marcel,et al. On the effectiveness of local binary patterns in face anti-spoofing , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).
[40] Takumi Kobayashi,et al. Motion recognition using local auto-correlation of space-time gradients , 2012, Pattern Recognit. Lett..
[41] Sébastien Marcel,et al. Spoofing 2D face recognition systems with 3D masks , 2013, 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG).
[42] Sébastien Marcel,et al. Can face anti-spoofing countermeasures work in a real world scenario? , 2013, 2013 International Conference on Biometrics (ICB).
[43] Oscar Déniz-Suárez,et al. ENCARA2: Real-time detection of multiple faces at different resolutions in video streams , 2007, J. Vis. Commun. Image Represent..
[44] Tieniu Tan,et al. Live face detection based on the analysis of Fourier spectra , 2004, SPIE Defense + Commercial Sensing.
[45] Stefan Winkler,et al. A no-reference perceptual blur metric , 2002, Proceedings. International Conference on Image Processing.
[46] Ralph Gross,et al. An Image Preprocessing Algorithm for Illumination Invariant Face Recognition , 2003, AVBPA.
[47] Jiri Matas,et al. Extended Set of Local Binary Patterns for Rapid Object Detection , 2010 .
[48] Peter D. Hiscocks,et al. Measuring Luminance with a Digital Camera , 2011 .
[49] Junjie Yan,et al. A face antispoofing database with diverse attacks , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[50] Guillermo Sapiro,et al. Online dictionary learning for sparse coding , 2009, ICML '09.
[51] Michele Nappi,et al. Moving face spoofing detection via 3D projective invariants , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[52] Jian Sun,et al. Guided Image Filtering , 2010, ECCV.
[53] A.C. Kokaram,et al. N-dimensional probability density function transfer and its application to color transfer , 2005, Tenth IEEE International Conference on Computer Vision (ICCV'05) Volume 1.
[54] Zhenhua Guo,et al. Rotation invariant texture classification using LBP variance (LBPV) with global matching , 2010, Pattern Recognit..
[55] Anil K. Jain,et al. Face Spoof Detection With Image Distortion Analysis , 2015, IEEE Transactions on Information Forensics and Security.
[56] Sébastien Marcel,et al. Biometric Antispoofing Methods: A Survey in Face Recognition , 2014, IEEE Access.
[57] Anderson Rocha,et al. Face Spoofing Detection Through Visual Codebooks of Spectral Temporal Cubes , 2015, IEEE Transactions on Image Processing.
[58] Chih-Jen Lin,et al. A Practical Guide to Support Vector Classication , 2008 .
[59] Hong Li,et al. A liveness detection method for face recognition based on optical flow field , 2009, 2009 International Conference on Image Analysis and Signal Processing.
[60] Jean-Luc Dugelay,et al. Reflectance analysis based countermeasure technique to detect face mask attacks , 2013, 2013 18th International Conference on Digital Signal Processing (DSP).
[61] Sébastien Marcel,et al. On the vulnerability of face verification systems to hill-climbing attacks , 2010, Pattern Recognit..
[62] Ming-Hsuan Yang,et al. Deblurring Face Images with Exemplars , 2014, ECCV.
[63] Katsushi Ikeuchi,et al. Separating Reflection Components of Textured Surfaces Using a Single Image , 2005, IEEE Trans. Pattern Anal. Mach. Intell..
[64] Junjie Yan,et al. Face liveness detection by exploring multiple scenic clues , 2012, 2012 12th International Conference on Control Automation Robotics & Vision (ICARCV).
[65] Anderson Rocha,et al. Face liveness detection under bad illumination conditions , 2011, 2011 18th IEEE International Conference on Image Processing.
[66] Sébastien Marcel,et al. Face Anti-spoofing Based on General Image Quality Assessment , 2014, 2014 22nd International Conference on Pattern Recognition.
[67] Nalini K. Ratha,et al. An Analysis of Minutiae Matching Strength , 2001, AVBPA.
[68] Matti Pietikäinen,et al. Face spoofing detection from single images using micro-texture analysis , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[69] Frédo Durand,et al. Eulerian video magnification for revealing subtle changes in the world , 2012, ACM Trans. Graph..
[70] R. Vidal,et al. Histograms of oriented optical flow and Binet-Cauchy kernels on nonlinear dynamical systems for the recognition of human actions , 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition.
[71] Matti Pietikäinen,et al. Local Binary Patterns for Still Images , 2011 .
[72] Samarth Bharadwaj,et al. Face anti-spoofing via motion magnification and multifeature videolet aggregation , 2014 .
[73] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[74] Josef Bigün,et al. Non-intrusive liveness detection by face images , 2009, Image Vis. Comput..
[75] Jean-Luc Dugelay,et al. Countermeasure for the protection of face recognition systems against mask attacks , 2013, 2013 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG).
[76] P. Ekman,et al. Facial action coding system: a technique for the measurement of facial movement , 1978 .
[77] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[78] Peter Robinson,et al. OpenFace: An open source facial behavior analysis toolkit , 2016, 2016 IEEE Winter Conference on Applications of Computer Vision (WACV).
[79] David Windridge,et al. Detection of Face Spoofing Using Visual Dynamics , 2015, IEEE Transactions on Information Forensics and Security.
[80] Fabio Roli,et al. Fusion of multiple clues for photo-attack detection in face recognition systems , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[81] Samarth Bharadwaj,et al. Computationally Efficient Face Spoofing Detection with Motion Magnification , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops.
[82] Ivana Chingovska,et al. On the Use of Client Identity Information for Face Antispoofing , 2015, IEEE Transactions on Information Forensics and Security.
[83] Simon Lucey,et al. Deformable Model Fitting by Regularized Landmark Mean-Shift , 2010, International Journal of Computer Vision.
[84] Shengcai Liao,et al. Face liveness detection with component dependent descriptor , 2013, 2013 International Conference on Biometrics (ICB).
[85] Julian Fiérrez,et al. Face verification put to test: A hill-climbing attack based on the uphill-simplex algorithm , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[86] Muhammad Adeel Waris. No intruders - securing face biometric systems from spoofing attacks , 2014 .
[87] Dmitry O. Gorodnichy,et al. Survey of commercial technologies for face recognition in video , 2014 .
[88] Yiannis S. Boutalis,et al. CEDD: Color and Edge Directivity Descriptor: A Compact Descriptor for Image Indexing and Retrieval , 2008, ICVS.
[89] Yun Q. Shi,et al. Is physics-based liveness detection truly possible with a single image? , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.
[90] Sébastien Marcel,et al. Counter-measures to photo attacks in face recognition: A public database and a baseline , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[91] Josef Bigün,et al. Verifying liveness by multiple experts in face biometrics , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[92] Edward H. Adelson,et al. Personal photo enhancement using example images , 2010, TOGS.
[93] Shih-Fu Chang,et al. Single-view recaptured image detection based on physics-based features , 2010, 2010 IEEE International Conference on Multimedia and Expo.
[94] K. Harshika. Image Quality Assessment for Fake Biometric Detection : Application to Iris , Fingerprint , and Face Recognition , 2017 .
[95] Miroslav Goljan,et al. Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.
[96] Lin Sun,et al. Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera , 2007, 2007 IEEE 11th International Conference on Computer Vision.
[97] Moncef Gabbouj,et al. Analysis of textural features for face biometric anti-spoofing , 2013, 21st European Signal Processing Conference (EUSIPCO 2013).
[98] Peter Robinson,et al. Constrained Local Neural Fields for Robust Facial Landmark Detection in the Wild , 2013, 2013 IEEE International Conference on Computer Vision Workshops.
[99] Sébastien Marcel,et al. Motion-based counter-measures to photo attacks in face recognition , 2014, IET Biom..