暂无分享,去创建一个
[1] Dumitru Erhan,et al. Going deeper with convolutions , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[2] David Menotti,et al. Deep Representations for Iris, Face, and Fingerprint Spoofing Detection , 2014, IEEE Transactions on Information Forensics and Security.
[3] N. Kose,et al. Classification of captured and recaptured images to detect photograph spoofing , 2012, 2012 International Conference on Informatics, Electronics & Vision (ICIEV).
[4] Anil K. Jain,et al. Generalizing Fingerprint Spoof Detector: Learning a One-Class Classifier , 2019, 2019 International Conference on Biometrics (ICB).
[5] Alexandros Iosifidis,et al. Neural class-specific regression for face verification , 2017, IET Biom..
[6] Yukun Ma,et al. A novel face presentation attack detection scheme based on multi-regional convolutional neural networks , 2020, Pattern Recognit. Lett..
[7] Taiamiti Edmunds,et al. Protection of 2D face identification systems against spoofing attacks. (Protection des systèmes d'identification faciale face à la fraude par présentation de leurres) , 2017 .
[8] Shengcai Liao,et al. Face liveness detection with component dependent descriptor , 2013, 2013 International Conference on Biometrics (ICB).
[9] P. Helman,et al. A formal framework for positive and negative detection schemes , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[10] Sébastien Marcel,et al. On the effectiveness of local binary patterns in face anti-spoofing , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).
[11] Lin Sun,et al. Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera , 2007, 2007 IEEE 11th International Conference on Computer Vision.
[12] Shervin Rahimzadeh Arashloo,et al. Multiscale binarised statistical image features for symmetric face matching using multiple descriptor fusion based on class-specific LDA , 2017, Pattern Analysis and Applications.
[13] Kang Ryoung Park,et al. Face liveness detection based on texture and frequency analyses , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[14] Emna Fourati,et al. Anti-spoofing in face recognition-based biometric authentication using Image Quality Assessment , 2019, Multimedia Tools and Applications.
[15] Matti Pietikäinen,et al. Face spoofing detection from single images using texture and local shape analysis , 2012, IET Biom..
[16] Samarth Bharadwaj,et al. Computationally Efficient Face Spoofing Detection with Motion Magnification , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops.
[17] Bill Triggs,et al. Histograms of oriented gradients for human detection , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[18] Junjie Yan,et al. A face antispoofing database with diverse attacks , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[19] Muhammad Awais,et al. Spoofing Attack Detection by Anomaly Detection , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[20] Junjie Yan,et al. Face liveness detection by exploring multiple scenic clues , 2012, 2012 12th International Conference on Control Automation Robotics & Vision (ICARCV).
[21] Josef Kittler,et al. Combining Multiple one-class Classifiers for Anomaly based Face Spoofing Attack Detection , 2019, 2019 International Conference on Biometrics (ICB).
[22] Anderson Rocha,et al. Video-Based Face Spoofing Detection through Visual Rhythm Analysis , 2012, 2012 25th SIBGRAPI Conference on Graphics, Patterns and Images.
[23] Michael S. Bernstein,et al. ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.
[24] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[25] Yaowu Chen,et al. Attention-Based Two-Stream Convolutional Networks for Face Spoofing Detection , 2020, IEEE Transactions on Information Forensics and Security.
[26] Yi Li,et al. Face Liveness Detection from a Single Image with Sparse Low Rank Bilinear Discriminative Model , 2010, ECCV.
[27] Anderson Rocha,et al. Face Spoofing Detection Through Visual Codebooks of Spectral Temporal Cubes , 2015, IEEE Transactions on Image Processing.
[28] Yaakov Tsaig,et al. Fast Solution of $\ell _{1}$ -Norm Minimization Problems When the Solution May Be Sparse , 2008, IEEE Transactions on Information Theory.
[29] Ivana Chingovska,et al. Trustworthy Biometric Verication under Spoong Attacks: Application to the Face Mode , 2015 .
[30] Woo Chaw Seng,et al. A review of biometric technology along with trends and prospects , 2014, Pattern Recognit..
[31] Anderson Rocha,et al. Using Visual Rhythms for Detecting Video-Based Facial Spoof Attacks , 2015, IEEE Transactions on Information Forensics and Security.
[32] Petru Radu,et al. Robust multimodal face and fingerprint fusion in the presence of spoofing attacks , 2016, Pattern Recognit..
[33] Jukka Komulainen,et al. Face Spoofing Detection Using Colour Texture Analysis , 2016, IEEE Transactions on Information Forensics and Security.
[34] Sébastien Marcel,et al. The Replay-Mobile Face Presentation-Attack Database , 2016, 2016 International Conference of the Biometrics Special Interest Group (BIOSIG).
[35] Alexandros Iosifidis,et al. Class-specific kernel discriminant analysis based on Cholesky decomposition , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).
[36] Stan Z. Li,et al. Person-Specific Face Antispoofing With Subject Domain Adaptation , 2015, IEEE Transactions on Information Forensics and Security.
[37] Keche Mokhtar,et al. The detection of spoofing by 3D mask in a 2D identity recognition system , 2017, Egyptian Informatics Journal.
[38] David Windridge,et al. Domain Anomaly Detection in Machine Perception: A System Architecture and Taxonomy , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[39] Tal Hassner,et al. Face recognition in unconstrained videos with matched background similarity , 2011, CVPR 2011.
[40] Feiyue Huang,et al. Unsupervised Domain Adaptation for Face Anti-Spoofing , 2018, IEEE Transactions on Information Forensics and Security.
[41] Josef Kittler,et al. Class-Specific Kernel Fusion of Multiple Descriptors for Face Verification Using Multiscale Binarised Statistical Image Features , 2014, IEEE Transactions on Information Forensics and Security.
[42] David Zhang,et al. A Survey of Sparse Representation: Algorithms and Applications , 2015, IEEE Access.
[43] Sushil K. Bhattacharjee,et al. Recent Advances in Face Presentation Attack Detection , 2019, Handbook of Biometric Anti-Spoofing, 2nd Ed..
[44] Lai-Man Po,et al. Integration of image quality and motion cues for face anti-spoofing: A neural network approach , 2016, J. Vis. Commun. Image Represent..
[45] Stefanos Zafeiriou,et al. Incremental Face Alignment in the Wild , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[46] Josef Kittler,et al. A Stacking Ensemble for Anomaly Based Client-Specific Face Spoofing Detection , 2020, 2020 IEEE International Conference on Image Processing (ICIP).
[47] Anderson Rocha,et al. Face spoofing detection through partial least squares and low-level descriptors , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[48] Andrew Zisserman,et al. Deep Face Recognition , 2015, BMVC.
[49] William J. Christmas,et al. Ieee Transactions on Information Forensics and Security 1 Face Spoofing Detection Based on Multiple Descriptor Fusion Using Multiscale Dynamic Binarized Statistical Image Features , 2022 .
[50] YuanFang,et al. Integration of image quality and motion cues for face anti-spoofing , 2016 .
[51] D. Donoho,et al. Fast Solution of -Norm Minimization Problems When the Solution May Be Sparse , 2008 .
[52] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[53] Matti Pietikäinen,et al. Competition on counter measures to 2-D facial spoofing attacks , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[54] Matti Pietikäinen,et al. Context based face anti-spoofing , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[55] Ivana Chingovska,et al. On the Use of Client Identity Information for Face Antispoofing , 2015, IEEE Transactions on Information Forensics and Security.
[56] Sébastien Marcel,et al. LBP - TOP Based Countermeasure against Face Spoofing Attacks , 2012, ACCV Workshops.
[57] Anjith George,et al. Deep Pixel-wise Binary Supervision for Face Presentation Attack Detection , 2019, 2019 International Conference on Biometrics (ICB).
[58] Siong Hoe Lau,et al. Face Spoofing Detection Based on Improved Local Graph Structure , 2014, 2014 International Conference on Information Science & Applications (ICISA).
[59] Bernhard Schölkopf,et al. Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.
[60] Xu Zhao,et al. Discriminative Representation Combinations for Accurate Face Spoofing Detection , 2018, Pattern Recognit..
[61] Alice Caplier,et al. Fake face detection based on radiometric distortions , 2016, 2016 Sixth International Conference on Image Processing Theory, Tools and Applications (IPTA).
[62] William J. Christmas,et al. An anomaly detection approach to face spoofing detection: A new formulation and evaluation protocol , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).
[63] Xiaoming Liu,et al. Face anti-spoofing using patch and depth-based CNNs , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).
[64] Maurizio Filippone,et al. A comparative evaluation of outlier detection algorithms: Experiments and analyses , 2018, Pattern Recognit..
[65] David A. McAllester,et al. Object Detection with Discriminatively Trained Part Based Models , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[66] Ricardo L. de Queiroz,et al. Face-Spoofing 2D-Detection Based on Moiré-Pattern Analysis , 2015, IEEE Transactions on Information Forensics and Security.
[67] D. Rubin,et al. Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .
[68] Marwan Mattar,et al. Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments , 2008 .
[69] Abdenour Hadid,et al. Face Biometrics Under Spoofing Attacks: Vulnerabilities, Countermeasures, Open Issues, and Research Directions , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops.
[70] Jean-Luc Dugelay,et al. Mask spoofing in face recognition and countermeasures , 2014, Image Vis. Comput..
[71] Alice Caplier,et al. Motion-based countermeasure against photo and video spoofing attacks in face recognition , 2018, J. Vis. Commun. Image Represent..
[72] Guodong Guo,et al. A survey on 3D mask presentation attack detection and countermeasures , 2020, Pattern Recognit..
[73] Richa Singh,et al. Detecting Silicone Mask-Based Presentation Attack via Deep Dictionary Learning , 2017, IEEE Transactions on Information Forensics and Security.
[74] Jukka Komulainen,et al. Face anti-spoofing based on color texture analysis , 2015, 2015 IEEE International Conference on Image Processing (ICIP).
[75] Ramachandra Raghavendra,et al. Presentation Attack Detection Methods for Face Recognition Systems , 2017, ACM Comput. Surv..
[76] Alexandros Iosifidis,et al. Multilinear class-specific discriminant analysis , 2017, Pattern Recognit. Lett..
[77] Stephanie Schuckers,et al. Integrating a wavelet based perspiration liveness check with fingerprint recognition , 2009, Pattern Recognit..
[78] Jukka Komulainen,et al. The 2nd competition on counter measures to 2D face spoofing attacks , 2013, 2013 International Conference on Biometrics (ICB).
[79] Josef Bigün,et al. Non-intrusive liveness detection by face images , 2009, Image Vis. Comput..
[80] Anderson Rocha,et al. Manifold learning for user profiling and identity verification using motion sensors , 2020, Pattern Recognit..
[81] Paul A. Viola,et al. Rapid object detection using a boosted cascade of simple features , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.
[82] Anderson Rocha,et al. Face liveness detection under bad illumination conditions , 2011, 2011 18th IEEE International Conference on Image Processing.
[83] Josef Bigün,et al. Verifying liveness by multiple experts in face biometrics , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[84] Sébastien Marcel,et al. Face Anti-spoofing Based on General Image Quality Assessment , 2014, 2014 22nd International Conference on Pattern Recognition.
[85] Sébastien Marcel,et al. Spoofing Face Recognition With 3D Masks , 2014, IEEE Transactions on Information Forensics and Security.
[86] Matti Pietikäinen,et al. Face spoofing detection from single images using micro-texture analysis , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[87] Anil K. Jain,et al. Face Spoof Detection With Image Distortion Analysis , 2015, IEEE Transactions on Information Forensics and Security.
[88] Matti Pietikäinen,et al. Complementary countermeasures for detecting scenic face spoofing attacks , 2013, 2013 International Conference on Biometrics (ICB).
[89] Klemen Grm,et al. Strengths and weaknesses of deep learning models for face recognition against image degradations , 2017, IET Biom..
[90] Jukka Komulainen,et al. OULU-NPU: A Mobile Face Presentation Attack Database with Real-World Variations , 2017, 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017).
[91] Shengcai Liao,et al. Face liveness detection using 3D structure recovered from a single camera , 2013, 2013 International Conference on Biometrics (ICB).
[92] Eimad E. A. Abusham,et al. Face Recognition Using Local Graph Structure (LGS) , 2011, HCI.
[93] Allen Y. Yang,et al. Robust Face Recognition via Sparse Representation , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[94] Alexander Binder,et al. Deep One-Class Classification , 2018, ICML.
[95] Lai-Man Po,et al. Enhancing deep discriminative feature maps via perturbation for face presentation attack detection , 2020, Image Vis. Comput..
[96] Jean-Luc Dugelay,et al. Reflectance analysis based countermeasure technique to detect face mask attacks , 2013, 2013 18th International Conference on Digital Signal Processing (DSP).
[97] Matti Pietikäinen,et al. Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[98] M. R. Osborne,et al. A new approach to variable selection in least squares problems , 2000 .
[99] Xiaoming Liu,et al. Deep Tree Learning for Zero-Shot Face Anti-Spoofing , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[100] Sébastien Marcel,et al. On Effectiveness of Anomaly Detection Approaches against Unseen Presentation Attacks in Face Anti-spoofing , 2018, 2018 International Conference on Biometrics (ICB).
[101] Alexandros Iosifidis,et al. Scaling Up Class-Specific Kernel Discriminant Analysis for Large-Scale Face Verification , 2016, IEEE Transactions on Information Forensics and Security.
[102] Robert P. W. Duin,et al. Support Vector Data Description , 2004, Machine Learning.
[103] Vitomir Struc,et al. Photometric Normalization Techniques for Illumination Invariance , 2011 .