Trustworthy Biometric Verication under Spoong Attacks: Application to the Face Mode
暂无分享,去创建一个
[1] Nguyen Minh Duc. Your face is NOT your password Face Authentication ByPassing Lenovo – Asus – Toshiba , 2009 .
[2] Stan Z. Li,et al. Face liveness detection by learning multispectral reflectance distributions , 2011, Face and Gesture 2011.
[3] David Menotti,et al. Deep Representations for Iris, Face, and Fingerprint Spoofing Detection , 2014, IEEE Transactions on Information Forensics and Security.
[4] Andrew Zisserman,et al. Efficient additive kernels via explicit feature maps , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[5] Ludmila I. Kuncheva,et al. Measures of Diversity in Classifier Ensembles and Their Relationship with the Ensemble Accuracy , 2003, Machine Learning.
[6] 丁晓青,et al. Face Live Detection Method Based on Physiological Motion Analysis , 2009 .
[7] Matti Pietikäinen,et al. Complementary countermeasures for detecting scenic face spoofing attacks , 2013, 2013 International Conference on Biometrics (ICB).
[8] Matti Pietikäinen,et al. Context based face anti-spoofing , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[9] Sébastien Marcel,et al. Motion-based counter-measures to photo attacks in face recognition , 2014, IET Biom..
[10] Sébastien Marcel,et al. Spoofing Face Recognition With 3D Masks , 2014, IEEE Transactions on Information Forensics and Security.
[11] Samarth Bharadwaj,et al. Computationally Efficient Face Spoofing Detection with Motion Magnification , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops.
[12] Ivana Chingovska,et al. On the Use of Client Identity Information for Face Antispoofing , 2015, IEEE Transactions on Information Forensics and Security.
[13] Junjie Yan,et al. Face liveness detection by exploring multiple scenic clues , 2012, 2012 12th International Conference on Control Automation Robotics & Vision (ICARCV).
[14] Shree K. Nayar,et al. Generalization of the Lambertian model and implications for machine vision , 1995, International Journal of Computer Vision.
[15] Matti Pietikäinen,et al. Face liveness detection using dynamic texture , 2014, EURASIP J. Image Video Process..
[16] J. MacQueen. Some methods for classification and analysis of multivariate observations , 1967 .
[17] E. Mayoraz,et al. Fusion of face and speech data for person identity verification , 1999, IEEE Trans. Neural Networks.
[18] MarcelSebastien,et al. Biometrics Evaluation Under Spoofing Attacks , 2014 .
[19] Cormac Herley,et al. A large-scale study of web password habits , 2007, WWW '07.
[20] Josef Kittler,et al. On the Use of Log-Likelihood Ratio Based Model-Specific Score Normalisation in Biometric Authentication , 2007, ICB.
[21] Sébastien Marcel,et al. Counter-measures to photo attacks in face recognition: A public database and a baseline , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[22] Josef Bigün,et al. Verifying liveness by multiple experts in face biometrics , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[23] GovindarajuVenu,et al. Robustness of multimodal biometric fusion methods against spoof attacks , 2009 .
[24] Sébastien Marcel,et al. On the Recent Use of Local Binary Patterns for Face Authentication , 2007 .
[25] Lin Sun,et al. Monocular camera-based face liveness detection by combining eyeblink and scene context , 2011, Telecommun. Syst..
[26] Arun Ross,et al. On the Dynamic Selection of Biometric Fusion Algorithms , 2010, IEEE Transactions on Information Forensics and Security.
[27] R. Adams. Proceedings , 1947 .
[28] Norbert Krüger,et al. Face recognition by elastic bunch graph matching , 1997, Proceedings of International Conference on Image Processing.
[29] David W. Hosmer,et al. Applied Logistic Regression , 1991 .
[30] Yun Q. Shi,et al. Is physics-based liveness detection truly possible with a single image? , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.
[31] Julian Fiérrez,et al. Adapted user-dependent multimodal biometric authentication exploiting general information , 2005, Pattern Recognit. Lett..
[32] Andreas Stolcke,et al. NAP and WCCN: Comparison of Approaches using MLLR-SVM Speaker Verification System , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[33] Hong Li,et al. A liveness detection method for face recognition based on optical flow field , 2009, 2009 International Conference on Image Analysis and Signal Processing.
[34] Elli Angelopoulou,et al. Understanding the color of human skin , 2001, IS&T/SPIE Electronic Imaging.
[35] Eduardo Lleida,et al. Preventing replay attacks on speaker verification systems , 2011, 2011 Carnahan Conference on Security Technology.
[36] G. Chetty,et al. Multi-Level Liveness Verification for Face-Voice Biometric Authentication , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.
[37] Paul L. Rosin,et al. Mapping and manipulating facial dynamics , 2011, Face and Gesture 2011.
[38] Matti Pietikäinen,et al. Face spoofing detection from single images using texture and local shape analysis , 2012, IET Biom..
[39] Samy Bengio,et al. User authentication via adapted statistical models of face images , 2006, IEEE Transactions on Signal Processing.
[40] Stan Z. Li,et al. Learn Convolutional Neural Network for Face Anti-Spoofing , 2014, ArXiv.
[41] Douglas A. Reynolds,et al. Speaker identification and verification using Gaussian mixture speaker models , 1995, Speech Commun..
[42] Arun Ross,et al. Information fusion in biometrics , 2003, Pattern Recognit. Lett..
[43] Xudong Jiang,et al. Exploiting global and local decisions for multimodal biometrics verification , 2004, IEEE Transactions on Signal Processing.
[44] Michele Nappi,et al. Moving face spoofing detection via 3D projective invariants , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[45] Matti Pietikäinen,et al. Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[46] Anderson Rocha,et al. Face spoofing detection through partial least squares and low-level descriptors , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[47] Mario Baum,et al. Handbook Of Biometrics , 2016 .
[48] Francine J. Prokoski. Disguise Detection And Identification Using Infrared Imagery , 1983, Other Conferences.
[49] Jiri Matas,et al. On Combining Classifiers , 1998, IEEE Trans. Pattern Anal. Mach. Intell..
[50] Tieniu Tan,et al. Combining Face and Iris Biometrics for Identity Verification , 2003, AVBPA.
[51] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.
[52] Sridha Sridharan,et al. Data-Driven Background Dataset Selection for SVM-Based Speaker Verification , 2010, IEEE Transactions on Audio, Speech, and Language Processing.
[53] Sébastien Marcel,et al. Comparison of MLP and GMM Classifiers for Face Verification on XM2VTS , 2003, AVBPA.
[54] Satoshi Hoshino,et al. Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.
[55] Javier Ortega-Garcia,et al. Facing Position Variability in Minutiae-Based Fingerprint Verification through Multiple References and Score Normalization Techniques , 2003, AVBPA.
[56] Alessandra Lumini,et al. An evaluation of direct attacks using fake fingers generated from ISO templates , 2010, Pattern Recognit. Lett..
[57] Josef Kittler,et al. An Experimental Comparison of Classifier Fusion Rules for Multimodal Personal Identity Verification Systems , 2002, Multiple Classifier Systems.
[58] L. O'Gorman,et al. Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.
[59] Fabio Roli,et al. Fusion of multiple clues for photo-attack detection in face recognition systems , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[60] Roland Auckenthaler,et al. Score Normalization for Text-Independent Speaker Verification Systems , 2000, Digit. Signal Process..
[61] Shengcai Liao,et al. Face liveness detection using 3D structure recovered from a single camera , 2013, 2013 International Conference on Biometrics (ICB).
[62] Jean-Philippe Thiran,et al. The BANCA Database and Evaluation Protocol , 2003, AVBPA.
[63] Anderson Rocha,et al. Video-Based Face Spoofing Detection through Visual Rhythm Analysis , 2012, 2012 25th SIBGRAPI Conference on Graphics, Patterns and Images.
[64] Douglas A. Reynolds,et al. Robust text-independent speaker identification using Gaussian mixture speaker models , 1995, IEEE Trans. Speech Audio Process..
[65] Yi Li,et al. Face Liveness Detection from a Single Image with Sparse Low Rank Bilinear Discriminative Model , 2010, ECCV.
[66] Vladimir Vapnik,et al. Statistical learning theory , 1998 .
[67] Jiri Matas,et al. Support vector machines for face authentication , 2002, Image Vis. Comput..
[68] I. Pavlidis,et al. The imaging issue in an automatic face/disguise detection system , 2000, Proceedings IEEE Workshop on Computer Vision Beyond the Visible Spectrum: Methods and Applications (Cat. No.PR00640).
[69] Nicholas W. D. Evans,et al. On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).
[70] Mitchell McLaren. Improving automatic speaker verification using SVM techniques , 2009 .
[71] Bernhard E. Boser,et al. A training algorithm for optimal margin classifiers , 1992, COLT '92.
[72] Cormac Herley,et al. Can "Something You Know" Be Saved? , 2008, ISC.
[73] Alvin F. Martin,et al. The DET curve in assessment of detection task performance , 1997, EUROSPEECH.
[74] Arun Ross,et al. Combining match scores with liveness values in a fingerprint verification system , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[75] Julian Fierrez,et al. Vulnerabilities in biometric systems: Attacks and recent advances in liveness detection , 2007 .
[76] Matti Pietikäinen,et al. Dynamic Texture Recognition Using Local Binary Patterns with an Application to Facial Expressions , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[77] Julian Fiérrez,et al. A Comparative Evaluation of Fusion Strategies for Multimodal Biometric Verification , 2003, AVBPA.
[78] Venu Govindaraju,et al. Comparison of combination methods utilizing T-normalization and second best score model , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[79] Matti Pietikäinen,et al. Face spoofing detection from single images using micro-texture analysis , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[80] Sangyoun Lee,et al. Face liveness detection using variable focusing , 2013, 2013 International Conference on Biometrics (ICB).
[81] J. L. Wayman,et al. Best practices in testing and reporting performance of biometric devices. , 2002 .
[82] J. Fierrez-Aguilar,et al. On the Vulnerability of Fingerprint Verification Systems to Fake Fingerprints Attacks , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.
[83] Nalini K. Ratha,et al. Biometric Verification: Looking Beyond Raw Similarity Scores , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[84] Stephanie Schuckers,et al. Increase the Security of Multibiometric Systems by Incorporating a Spoofing Detection Algorithm in the Fusion Mechanism , 2011, MCS.
[85] Douglas A. Reynolds,et al. SHEEP, GOATS, LAMBS and WOLVES A Statistical Analysis of Speaker Performance in the NIST 1998 Speaker Recognition Evaluation , 1998 .
[86] Chin-Hui Lee,et al. Maximum a posteriori estimation for multivariate Gaussian mixture observations of Markov chains , 1994, IEEE Trans. Speech Audio Process..
[87] Sébastien Marcel,et al. Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition , 2014, IEEE Transactions on Image Processing.
[88] Nalini K. Ratha,et al. An Analysis of Minutiae Matching Strength , 2001, AVBPA.
[89] Arun Ross,et al. Analysis of user-specific score characteristics for spoof biometric attacks , 2012, 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[90] W. Kruskal,et al. Use of Ranks in One-Criterion Variance Analysis , 1952 .
[91] Radford M. Neal. Pattern Recognition and Machine Learning , 2007, Technometrics.
[92] Sébastien Marcel,et al. Inter-session variability modelling and joint factor analysis for face authentication , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[93] Sébastien Marcel,et al. An Open Source Framework for Standardized Comparisons of Face Recognition Algorithms , 2012, ECCV Workshops.
[94] M. F.,et al. Bibliography , 1985, Experimental Gerontology.
[95] D. Rubin,et al. Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .
[96] Kiran B. Raja,et al. Presentation Attack Detection for Face Recognition Using Light Field Camera , 2015, IEEE Transactions on Image Processing.
[97] Robert H. Deng,et al. Understanding OSN-based facial disclosure against face authentication systems , 2014, AsiaCCS.
[98] Sébastien Marcel,et al. Anti-spoofing in Action: Joint Operation with a Verification System , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops.
[99] Seongbeak Yoon,et al. Masked fake face detection using radiance measurements. , 2009, Journal of the Optical Society of America. A, Optics, image science, and vision.
[100] Nello Cristianini,et al. An Introduction to Support Vector Machines and Other Kernel-based Learning Methods , 2000 .
[101] Xiaoli Hao,et al. A New Multispectral Method for Face Liveness Detection , 2013, 2013 2nd IAPR Asian Conference on Pattern Recognition.
[102] Eric R. Ziegel,et al. The Elements of Statistical Learning , 2003, Technometrics.
[103] Julian Fiérrez,et al. Direct Attacks Using Fake Images in Iris Verification , 2008, BIOID.
[104] Shengcai Liao,et al. Face liveness detection with component dependent descriptor , 2013, 2013 International Conference on Biometrics (ICB).
[105] Tsuhan Chen,et al. A GMM parts based face representation for improved verification through relevance adaptation , 2004, Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2004. CVPR 2004..
[106] Francesca Odone,et al. Histogram intersection kernel for image classification , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[107] Wen Gao,et al. Local Gabor binary pattern histogram sequence (LGBPHS): a novel non-statistical model for face representation and recognition , 2005, Tenth IEEE International Conference on Computer Vision (ICCV'05) Volume 1.
[108] Jukka Komulainen,et al. The 2nd competition on counter measures to 2D face spoofing attacks , 2013, 2013 International Conference on Biometrics (ICB).
[109] Sébastien Marcel,et al. Anti-spoofing, Evaluation Methodologies , 2015, Encyclopedia of Biometrics.
[110] Anil K. Jain,et al. Face Spoof Detection With Image Distortion Analysis , 2015, IEEE Transactions on Information Forensics and Security.
[111] Gian Luca Marcialis,et al. Evaluation of serial and parallel multibiometric systems under spoofing attacks , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[112] Michael Wagner,et al. Audio-visual multimodal fusion for biometric person authentication and liveness verification , 2006 .
[113] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[114] Douglas A. Reynolds,et al. Speaker Verification Using Adapted Gaussian Mixture Models , 2000, Digit. Signal Process..
[115] Norman Poh,et al. Biometric system design under zero and non-zero effort attacks , 2013, 2013 International Conference on Biometrics (ICB).
[116] P. Schmid,et al. Dynamic mode decomposition of numerical and experimental data , 2008, Journal of Fluid Mechanics.
[117] J. van Leeuwen,et al. Audio- and Video-Based Biometric Person Authentication , 2001, Lecture Notes in Computer Science.
[118] Xiaoyang Tan,et al. Enhanced Local Texture Feature Sets for Face Recognition Under Difficult Lighting Conditions , 2007, IEEE Transactions on Image Processing.
[119] David Zhang,et al. User Authentication Using Fusion of Face and Palmprint , 2009, Int. J. Image Graph..
[120] Arun Ross,et al. Learning user-specific parameters in a multibiometric system , 2002, Proceedings. International Conference on Image Processing.
[121] Sébastien Marcel,et al. Anti-spoofing, Face Databases , 2015, Encyclopedia of Biometrics.
[122] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[123] Venu Govindaraju,et al. Evaluation of biometric spoofing in a multimodal system , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[124] Julian Fiérrez,et al. Author's Personal Copy Future Generation Computer Systems a High Performance Fingerprint Liveness Detection Method Based on Quality Related Features , 2022 .
[125] Bill Triggs,et al. Histograms of oriented gradients for human detection , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[126] Shih-Fu Chang,et al. Single-view recaptured image detection based on physics-based features , 2010, 2010 IEEE International Conference on Multimedia and Expo.
[127] Sébastien Marcel,et al. Bob: a free signal processing and machine learning toolbox for researchers , 2012, ACM Multimedia.
[128] Arun Ross,et al. A Bayesian approach for modeling sensor influence on quality, liveness and match score values in fingerprint verification , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).
[129] Lin Sun,et al. Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera , 2007, 2007 IEEE 11th International Conference on Computer Vision.
[130] Sébastien Marcel,et al. Spoofing Attacks To 2D Face Recognition Systems With 3D Masks , 2013, ICB 2013.
[131] Farzin Deravi,et al. Spoofing attempt detection using gaze colocation , 2013, 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG).
[132] Alvin F. Martin,et al. The NIST 1999 Speaker Recognition Evaluation - An Overview , 2000, Digit. Signal Process..
[133] Stephen M. Matyas,et al. A Biometric Standard for Information Management and Security , 2000, Comput. Secur..
[134] Alexander Werner,et al. Avoiding replay-attacks in a face recognition system using head-pose estimation , 2003, 2003 IEEE International SOI Conference. Proceedings (Cat. No.03CH37443).
[135] Sébastien Marcel,et al. Evaluation Methodologies , 2014, Handbook of Biometric Anti-Spoofing.
[136] Sébastien Marcel,et al. Can face anti-spoofing countermeasures work in a real world scenario? , 2013, 2013 International Conference on Biometrics (ICB).
[137] Tieniu Tan,et al. Live face detection based on the analysis of Fourier spectra , 2004, SPIE Defense + Commercial Sensing.
[138] Josef Bigün,et al. Non-intrusive liveness detection by face images , 2009, Image Vis. Comput..
[139] Jean-Luc Dugelay,et al. Countermeasure for the protection of face recognition systems against mask attacks , 2013, 2013 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG).
[140] Bruce A. Draper,et al. Preliminary studies on the Good, the Bad, and the Ugly face recognition challenge problem , 2012, 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[141] Radford M. Neal. A new view of the EM algorithm that justifies incremental and other variants , 1993 .
[142] Gian Luca Marcialis,et al. Robustness analysis of likelihood ratio score fusion rule for multimodal biometric systems under spoof attacks , 2011, 2011 Carnahan Conference on Security Technology.
[143] Samy Bengio,et al. Database, protocols and tools for evaluating score-level fusion algorithms in biometric authentication , 2006, Pattern Recognit..
[144] Kuldip K. Paliwal,et al. Fast features for face authentication under illumination direction changes , 2003, Pattern Recognit. Lett..
[145] Samy Bengio,et al. The Expected Performance Curve , 2003, ICML 2003.
[146] Rolf P. Würtz,et al. Face Recognition with Disparity Corrected Gabor Phase Differences , 2012, ICANN.
[147] Joachim M. Buhmann,et al. Non-parametric similarity measures for unsupervised texture segmentation and image retrieval , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[148] Sébastien Marcel,et al. On the effectiveness of local binary patterns in face anti-spoofing , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).
[149] Frank Stajano,et al. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes , 2012, 2012 IEEE Symposium on Security and Privacy.
[150] David Windridge,et al. Detection of Face Spoofing Using Visual Dynamics , 2015, IEEE Transactions on Information Forensics and Security.
[151] Aaron E. Rosenberg,et al. Speaker background models for connected digit password speaker verification , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.
[152] Alvin F. Martin,et al. NIST Speaker Recognition Evaluation Chronicles - Part 2 , 2006, 2006 IEEE Odyssey - The Speaker and Language Recognition Workshop.
[153] Slobodan Kalajdziski,et al. Protein Function Prediction Based on Neighborhood Profiles , 2009, ICT Innovations.
[154] Stephanie Schuckers,et al. Spoofing and Anti-Spoofing Measures , 2002, Inf. Secur. Tech. Rep..
[155] S. P. Lloyd,et al. Least squares quantization in PCM , 1982, IEEE Trans. Inf. Theory.
[156] Matthias W. Seeger,et al. Using the Nyström Method to Speed Up Kernel Machines , 2000, NIPS.
[157] Zoran A. Ivanovski,et al. Automatic image orientation detection with prior hierarchical content-based classification , 2011, 2011 18th IEEE International Conference on Image Processing.
[158] Sébastien Marcel,et al. Biometrics Evaluation Under Spoofing Attacks , 2014, IEEE Transactions on Information Forensics and Security.
[159] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[160] Sébastien Marcel,et al. Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[161] Frédo Durand,et al. Eulerian video magnification for revealing subtle changes in the world , 2012, ACM Trans. Graph..