A Taxonomy on Biometric Security and Its Applications
暂无分享,去创建一个
[1] Sébastien Marcel,et al. On the vulnerability of face verification systems to hill-climbing attacks , 2010, Pattern Recognit..
[2] Abu Asaduzzaman,et al. A time-efficient image processing algorithm for multicore/manycore parallel computing , 2015, SoutheastCon 2015.
[3] Jyotika Kapur,et al. Security Using Image Processing , 2013 .
[4] Junjie Yan,et al. A face antispoofing database with diverse attacks , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[5] Patrick J. Flynn,et al. A sparse representation approach to face matching across plastic surgery , 2012, 2012 IEEE Workshop on the Applications of Computer Vision (WACV).
[6] Jöran Beel,et al. ePassport - The World's New Electronic Passport: A Report about the ePassport's Benefits, Risks and its Security , 2007 .
[7] Rolf Ingold,et al. A New Forgery Scenario Based on Regaining Dynamics of Signature , 2007, ICB.
[8] Amitabh Wahi,et al. A Study of Liveness Detection in Face Biometric Systems , 2014 .
[9] Sébastien Marcel,et al. Can face anti-spoofing countermeasures work in a real world scenario? , 2013, 2013 International Conference on Biometrics (ICB).
[10] Satoshi Hoshino,et al. Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.
[11] Robert H. Deng,et al. Understanding OSN-based facial disclosure against face authentication systems , 2014, AsiaCCS.
[12] Richa Singh,et al. Face recognition CAPTCHA , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[13] Danilo Gligoroski,et al. Walk the Walk: Attacking Gait Biometrics by Imitation , 2010, ISC.
[14] Jukka Komulainen,et al. On the generalization of color texture-based face anti-spoofing , 2018, Image Vis. Comput..
[15] Sébastien Marcel,et al. Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[16] Julian Fierrez,et al. Hill-climbing attack to an Eigenface-based face verification system , 2009, 2009 First IEEE International Conference on Biometrics, Identity and Security (BIdS).
[17] Anderson Rocha,et al. Video-Based Face Spoofing Detection through Visual Rhythm Analysis , 2012, 2012 25th SIBGRAPI Conference on Graphics, Patterns and Images.
[18] Rama Chellappa,et al. Facial attributes for active authentication on mobile devices , 2017, Image Vis. Comput..
[19] Muhammad Khurram Khan,et al. A software agent enabled biometric security algorithm for secure file access in consumer storage devices , 2017, IEEE Transactions on Consumer Electronics.
[20] WADOOD ABDUL,et al. Biometric Security Through Visual Encryption for Fog Edge Computing , 2017, IEEE Access.
[21] Himanshu S. Bhatt,et al. Plastic Surgery: A New Dimension to Face Recognition , 2010, IEEE Transactions on Information Forensics and Security.
[22] Sébastien Marcel,et al. Spoofing Face Recognition With 3D Masks , 2014, IEEE Transactions on Information Forensics and Security.
[23] Michele Nappi,et al. Moving face spoofing detection via 3D projective invariants , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[24] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[25] Sangeet Saha,et al. A brief experience on journey through hardware developments for image processing and its applications on Cryptography , 2012, ArXiv.
[26] Raihan Uddin Ahmed,et al. Image processing based Feature extraction of Bangladeshi banknotes , 2014, The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014).
[27] Lin Sun,et al. Monocular camera-based face liveness detection by combining eyeblink and scene context , 2011, Telecommun. Syst..
[28] Sébastien Marcel,et al. Counter-measures to photo attacks in face recognition: A public database and a baseline , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[29] Jang-Hee Yoo,et al. A motion and similarity-based fake detection method for biometric face recognition systems , 2011, IEEE Transactions on Consumer Electronics.
[30] Jean-Luc Dugelay,et al. On the vulnerability of face recognition systems to spoofing mask attacks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[31] Jukka Komulainen,et al. The 2nd competition on counter measures to 2D face spoofing attacks , 2013, 2013 International Conference on Biometrics (ICB).
[32] Alexei A. Efros,et al. Image‐based Shaving , 2008, Comput. Graph. Forum.
[33] Gian Luca Marcialis,et al. Evaluation of serial and parallel multibiometric systems under spoofing attacks , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[34] Alessandra Lumini,et al. An evaluation of direct attacks using fake fingers generated from ISO templates , 2010, Pattern Recognit. Lett..
[35] Rajat Sachdeva,et al. Feature fusion for fake Indian currency detection , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).
[36] Matti Pietikäinen,et al. Competition on counter measures to 2-D facial spoofing attacks , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[37] Sébastien Marcel,et al. LBP - TOP Based Countermeasure against Face Spoofing Attacks , 2012, ACCV Workshops.
[38] Arun Ross,et al. Can facial cosmetics affect the matching accuracy of face recognition systems? , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[39] Massimo Tistarelli,et al. Structural Similarity based image quality map for face recognition across plastic surgery , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[40] Sébastien Marcel,et al. Spoofing 2D face recognition systems with 3D masks , 2013, 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG).
[41] Shengcai Liao,et al. Face liveness detection using 3D structure recovered from a single camera , 2013, 2013 International Conference on Biometrics (ICB).
[42] Sébastien Marcel,et al. On the vulnerability of finger vein recognition to spoofing , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).
[43] Julian Fiérrez,et al. Evaluation of direct attacks to fingerprint verification systems , 2011, Telecommun. Syst..
[44] Yunde Jia,et al. Anisotropic Diffusion-based Kernel Matrix Model for Face Liveness Detection , 2019, Image Vis. Comput..
[45] Seongbeak Yoon,et al. Masked fake face detection using radiance measurements. , 2009, Journal of the Optical Society of America. A, Optics, image science, and vision.
[46] Nicholas W. D. Evans,et al. On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).
[47] Bin Qin,et al. The Anti-spoofing Study of Vein Identification System , 2009, 2009 International Conference on Computational Intelligence and Security.
[48] Sébastien Marcel,et al. On the effectiveness of local binary patterns in face anti-spoofing , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).
[49] Lin Sun,et al. Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera , 2007, 2007 IEEE 11th International Conference on Computer Vision.
[50] K. Davis,et al. Automatic Recognition of Spoken Digits , 1952 .