Trustworthy Biometric Verication under Spoong Attacks: Application to the Face Mode

The need for automation of the identity recognition process for a vast number of applications resulted in great advancement of biometric systems in the recent years. Yet, many studies indicate that these systems suffer from vulnerabilities to spoofing (presentation) attacks: a weakness that may compromise their usage in many cases. Face verification systems account for one of the most attractive spoofing targets, due to the easy access to face images of users, as well as the simplicity of the spoofing attack manufacturing process. Many counter-measures to spoofing have been proposed in the literature. They are based on different cues that are used to distinguish between real accesses and spoofing attacks. The task of detecting spoofing attacks is most often considered as a binary classification problem, with real accesses being the positive class and spoofing attacks being the negative class. The main objective of this thesis is to put the problem of anti-spoofing in a wider context, with an accent on its cooperation with a biometric verification system. In such a context, it is important to adopt an integrated perspective on biometric verification and anti-spoofing. In this thesis we identify and address three points where integration of the two systems is of interest. The first integration point is situated at input-level. At this point, we are concerned with providing a unified information that both verification and anti-spoofing systems use. The unified information includes the samples used to enroll clients in the system, as well as the identity claims of the client at query time. We design two anti-spoofing schemes, one with a generative and one with a discriminative approach, which we refer to as client-specific, as opposed to the traditional client-independent ones. At the second integration point, situated at output-level, we address the issue of combining the output of biometric verification and anti-spoofing systems in order to achieve an optimal combined decision about an input sample. We adopt a multiple expert fusion approach and we investigate several fusion methods, comparing the verification performance and robustness to spoofing of the fused systems. The third integration point is associated with the evaluation process. The integrated perspective implies three types of inputs for the biometric system: real accesses, zero-effort impostors and spoofing attacks. We propose an evaluation methodology for biometric verification systems under spoofing attacks, called Expected Performance and Spoofability (EPS) framework, which accounts for all the three types of input and the error rates associated with them. Within this framework, we propose the EPS Curve (EPSC), which enables unbiased comparison of systems.

[1]  Nguyen Minh Duc Your face is NOT your password Face Authentication ByPassing Lenovo – Asus – Toshiba , 2009 .

[2]  Stan Z. Li,et al.  Face liveness detection by learning multispectral reflectance distributions , 2011, Face and Gesture 2011.

[3]  David Menotti,et al.  Deep Representations for Iris, Face, and Fingerprint Spoofing Detection , 2014, IEEE Transactions on Information Forensics and Security.

[4]  Andrew Zisserman,et al.  Efficient additive kernels via explicit feature maps , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[5]  Ludmila I. Kuncheva,et al.  Measures of Diversity in Classifier Ensembles and Their Relationship with the Ensemble Accuracy , 2003, Machine Learning.

[6]  丁晓青,et al.  Face Live Detection Method Based on Physiological Motion Analysis , 2009 .

[7]  Matti Pietikäinen,et al.  Complementary countermeasures for detecting scenic face spoofing attacks , 2013, 2013 International Conference on Biometrics (ICB).

[8]  Matti Pietikäinen,et al.  Context based face anti-spoofing , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[9]  Sébastien Marcel,et al.  Motion-based counter-measures to photo attacks in face recognition , 2014, IET Biom..

[10]  Sébastien Marcel,et al.  Spoofing Face Recognition With 3D Masks , 2014, IEEE Transactions on Information Forensics and Security.

[11]  Samarth Bharadwaj,et al.  Computationally Efficient Face Spoofing Detection with Motion Magnification , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops.

[12]  Ivana Chingovska,et al.  On the Use of Client Identity Information for Face Antispoofing , 2015, IEEE Transactions on Information Forensics and Security.

[13]  Junjie Yan,et al.  Face liveness detection by exploring multiple scenic clues , 2012, 2012 12th International Conference on Control Automation Robotics & Vision (ICARCV).

[14]  Shree K. Nayar,et al.  Generalization of the Lambertian model and implications for machine vision , 1995, International Journal of Computer Vision.

[15]  Matti Pietikäinen,et al.  Face liveness detection using dynamic texture , 2014, EURASIP J. Image Video Process..

[16]  J. MacQueen Some methods for classification and analysis of multivariate observations , 1967 .

[17]  E. Mayoraz,et al.  Fusion of face and speech data for person identity verification , 1999, IEEE Trans. Neural Networks.

[18]  MarcelSebastien,et al.  Biometrics Evaluation Under Spoofing Attacks , 2014 .

[19]  Cormac Herley,et al.  A large-scale study of web password habits , 2007, WWW '07.

[20]  Josef Kittler,et al.  On the Use of Log-Likelihood Ratio Based Model-Specific Score Normalisation in Biometric Authentication , 2007, ICB.

[21]  Sébastien Marcel,et al.  Counter-measures to photo attacks in face recognition: A public database and a baseline , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[22]  Josef Bigün,et al.  Verifying liveness by multiple experts in face biometrics , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[23]  GovindarajuVenu,et al.  Robustness of multimodal biometric fusion methods against spoof attacks , 2009 .

[24]  Sébastien Marcel,et al.  On the Recent Use of Local Binary Patterns for Face Authentication , 2007 .

[25]  Lin Sun,et al.  Monocular camera-based face liveness detection by combining eyeblink and scene context , 2011, Telecommun. Syst..

[26]  Arun Ross,et al.  On the Dynamic Selection of Biometric Fusion Algorithms , 2010, IEEE Transactions on Information Forensics and Security.

[27]  R. Adams Proceedings , 1947 .

[28]  Norbert Krüger,et al.  Face recognition by elastic bunch graph matching , 1997, Proceedings of International Conference on Image Processing.

[29]  David W. Hosmer,et al.  Applied Logistic Regression , 1991 .

[30]  Yun Q. Shi,et al.  Is physics-based liveness detection truly possible with a single image? , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.

[31]  Julian Fiérrez,et al.  Adapted user-dependent multimodal biometric authentication exploiting general information , 2005, Pattern Recognit. Lett..

[32]  Andreas Stolcke,et al.  NAP and WCCN: Comparison of Approaches using MLLR-SVM Speaker Verification System , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[33]  Hong Li,et al.  A liveness detection method for face recognition based on optical flow field , 2009, 2009 International Conference on Image Analysis and Signal Processing.

[34]  Elli Angelopoulou,et al.  Understanding the color of human skin , 2001, IS&T/SPIE Electronic Imaging.

[35]  Eduardo Lleida,et al.  Preventing replay attacks on speaker verification systems , 2011, 2011 Carnahan Conference on Security Technology.

[36]  G. Chetty,et al.  Multi-Level Liveness Verification for Face-Voice Biometric Authentication , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.

[37]  Paul L. Rosin,et al.  Mapping and manipulating facial dynamics , 2011, Face and Gesture 2011.

[38]  Matti Pietikäinen,et al.  Face spoofing detection from single images using texture and local shape analysis , 2012, IET Biom..

[39]  Samy Bengio,et al.  User authentication via adapted statistical models of face images , 2006, IEEE Transactions on Signal Processing.

[40]  Stan Z. Li,et al.  Learn Convolutional Neural Network for Face Anti-Spoofing , 2014, ArXiv.

[41]  Douglas A. Reynolds,et al.  Speaker identification and verification using Gaussian mixture speaker models , 1995, Speech Commun..

[42]  Arun Ross,et al.  Information fusion in biometrics , 2003, Pattern Recognit. Lett..

[43]  Xudong Jiang,et al.  Exploiting global and local decisions for multimodal biometrics verification , 2004, IEEE Transactions on Signal Processing.

[44]  Michele Nappi,et al.  Moving face spoofing detection via 3D projective invariants , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[45]  Matti Pietikäinen,et al.  Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[46]  Anderson Rocha,et al.  Face spoofing detection through partial least squares and low-level descriptors , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[47]  Mario Baum,et al.  Handbook Of Biometrics , 2016 .

[48]  Francine J. Prokoski Disguise Detection And Identification Using Infrared Imagery , 1983, Other Conferences.

[49]  Jiri Matas,et al.  On Combining Classifiers , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[50]  Tieniu Tan,et al.  Combining Face and Iris Biometrics for Identity Verification , 2003, AVBPA.

[51]  M. Angela Sasse,et al.  Users are not the enemy , 1999, CACM.

[52]  Sridha Sridharan,et al.  Data-Driven Background Dataset Selection for SVM-Based Speaker Verification , 2010, IEEE Transactions on Audio, Speech, and Language Processing.

[53]  Sébastien Marcel,et al.  Comparison of MLP and GMM Classifiers for Face Verification on XM2VTS , 2003, AVBPA.

[54]  Satoshi Hoshino,et al.  Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.

[55]  Javier Ortega-Garcia,et al.  Facing Position Variability in Minutiae-Based Fingerprint Verification through Multiple References and Score Normalization Techniques , 2003, AVBPA.

[56]  Alessandra Lumini,et al.  An evaluation of direct attacks using fake fingers generated from ISO templates , 2010, Pattern Recognit. Lett..

[57]  Josef Kittler,et al.  An Experimental Comparison of Classifier Fusion Rules for Multimodal Personal Identity Verification Systems , 2002, Multiple Classifier Systems.

[58]  L. O'Gorman,et al.  Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.

[59]  Fabio Roli,et al.  Fusion of multiple clues for photo-attack detection in face recognition systems , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[60]  Roland Auckenthaler,et al.  Score Normalization for Text-Independent Speaker Verification Systems , 2000, Digit. Signal Process..

[61]  Shengcai Liao,et al.  Face liveness detection using 3D structure recovered from a single camera , 2013, 2013 International Conference on Biometrics (ICB).

[62]  Jean-Philippe Thiran,et al.  The BANCA Database and Evaluation Protocol , 2003, AVBPA.

[63]  Anderson Rocha,et al.  Video-Based Face Spoofing Detection through Visual Rhythm Analysis , 2012, 2012 25th SIBGRAPI Conference on Graphics, Patterns and Images.

[64]  Douglas A. Reynolds,et al.  Robust text-independent speaker identification using Gaussian mixture speaker models , 1995, IEEE Trans. Speech Audio Process..

[65]  Yi Li,et al.  Face Liveness Detection from a Single Image with Sparse Low Rank Bilinear Discriminative Model , 2010, ECCV.

[66]  Vladimir Vapnik,et al.  Statistical learning theory , 1998 .

[67]  Jiri Matas,et al.  Support vector machines for face authentication , 2002, Image Vis. Comput..

[68]  I. Pavlidis,et al.  The imaging issue in an automatic face/disguise detection system , 2000, Proceedings IEEE Workshop on Computer Vision Beyond the Visible Spectrum: Methods and Applications (Cat. No.PR00640).

[69]  Nicholas W. D. Evans,et al.  On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).

[70]  Mitchell McLaren Improving automatic speaker verification using SVM techniques , 2009 .

[71]  Bernhard E. Boser,et al.  A training algorithm for optimal margin classifiers , 1992, COLT '92.

[72]  Cormac Herley,et al.  Can "Something You Know" Be Saved? , 2008, ISC.

[73]  Alvin F. Martin,et al.  The DET curve in assessment of detection task performance , 1997, EUROSPEECH.

[74]  Arun Ross,et al.  Combining match scores with liveness values in a fingerprint verification system , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[75]  Julian Fierrez,et al.  Vulnerabilities in biometric systems: Attacks and recent advances in liveness detection , 2007 .

[76]  Matti Pietikäinen,et al.  Dynamic Texture Recognition Using Local Binary Patterns with an Application to Facial Expressions , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[77]  Julian Fiérrez,et al.  A Comparative Evaluation of Fusion Strategies for Multimodal Biometric Verification , 2003, AVBPA.

[78]  Venu Govindaraju,et al.  Comparison of combination methods utilizing T-normalization and second best score model , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[79]  Matti Pietikäinen,et al.  Face spoofing detection from single images using micro-texture analysis , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[80]  Sangyoun Lee,et al.  Face liveness detection using variable focusing , 2013, 2013 International Conference on Biometrics (ICB).

[81]  J. L. Wayman,et al.  Best practices in testing and reporting performance of biometric devices. , 2002 .

[82]  J. Fierrez-Aguilar,et al.  On the Vulnerability of Fingerprint Verification Systems to Fake Fingerprints Attacks , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.

[83]  Nalini K. Ratha,et al.  Biometric Verification: Looking Beyond Raw Similarity Scores , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[84]  Stephanie Schuckers,et al.  Increase the Security of Multibiometric Systems by Incorporating a Spoofing Detection Algorithm in the Fusion Mechanism , 2011, MCS.

[85]  Douglas A. Reynolds,et al.  SHEEP, GOATS, LAMBS and WOLVES A Statistical Analysis of Speaker Performance in the NIST 1998 Speaker Recognition Evaluation , 1998 .

[86]  Chin-Hui Lee,et al.  Maximum a posteriori estimation for multivariate Gaussian mixture observations of Markov chains , 1994, IEEE Trans. Speech Audio Process..

[87]  Sébastien Marcel,et al.  Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition , 2014, IEEE Transactions on Image Processing.

[88]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[89]  Arun Ross,et al.  Analysis of user-specific score characteristics for spoof biometric attacks , 2012, 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[90]  W. Kruskal,et al.  Use of Ranks in One-Criterion Variance Analysis , 1952 .

[91]  Radford M. Neal Pattern Recognition and Machine Learning , 2007, Technometrics.

[92]  Sébastien Marcel,et al.  Inter-session variability modelling and joint factor analysis for face authentication , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[93]  Sébastien Marcel,et al.  An Open Source Framework for Standardized Comparisons of Face Recognition Algorithms , 2012, ECCV Workshops.

[94]  M. F.,et al.  Bibliography , 1985, Experimental Gerontology.

[95]  D. Rubin,et al.  Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .

[96]  Kiran B. Raja,et al.  Presentation Attack Detection for Face Recognition Using Light Field Camera , 2015, IEEE Transactions on Image Processing.

[97]  Robert H. Deng,et al.  Understanding OSN-based facial disclosure against face authentication systems , 2014, AsiaCCS.

[98]  Sébastien Marcel,et al.  Anti-spoofing in Action: Joint Operation with a Verification System , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops.

[99]  Seongbeak Yoon,et al.  Masked fake face detection using radiance measurements. , 2009, Journal of the Optical Society of America. A, Optics, image science, and vision.

[100]  Nello Cristianini,et al.  An Introduction to Support Vector Machines and Other Kernel-based Learning Methods , 2000 .

[101]  Xiaoli Hao,et al.  A New Multispectral Method for Face Liveness Detection , 2013, 2013 2nd IAPR Asian Conference on Pattern Recognition.

[102]  Eric R. Ziegel,et al.  The Elements of Statistical Learning , 2003, Technometrics.

[103]  Julian Fiérrez,et al.  Direct Attacks Using Fake Images in Iris Verification , 2008, BIOID.

[104]  Shengcai Liao,et al.  Face liveness detection with component dependent descriptor , 2013, 2013 International Conference on Biometrics (ICB).

[105]  Tsuhan Chen,et al.  A GMM parts based face representation for improved verification through relevance adaptation , 2004, Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2004. CVPR 2004..

[106]  Francesca Odone,et al.  Histogram intersection kernel for image classification , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[107]  Wen Gao,et al.  Local Gabor binary pattern histogram sequence (LGBPHS): a novel non-statistical model for face representation and recognition , 2005, Tenth IEEE International Conference on Computer Vision (ICCV'05) Volume 1.

[108]  Jukka Komulainen,et al.  The 2nd competition on counter measures to 2D face spoofing attacks , 2013, 2013 International Conference on Biometrics (ICB).

[109]  Sébastien Marcel,et al.  Anti-spoofing, Evaluation Methodologies , 2015, Encyclopedia of Biometrics.

[110]  Anil K. Jain,et al.  Face Spoof Detection With Image Distortion Analysis , 2015, IEEE Transactions on Information Forensics and Security.

[111]  Gian Luca Marcialis,et al.  Evaluation of serial and parallel multibiometric systems under spoofing attacks , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[112]  Michael Wagner,et al.  Audio-visual multimodal fusion for biometric person authentication and liveness verification , 2006 .

[113]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[114]  Douglas A. Reynolds,et al.  Speaker Verification Using Adapted Gaussian Mixture Models , 2000, Digit. Signal Process..

[115]  Norman Poh,et al.  Biometric system design under zero and non-zero effort attacks , 2013, 2013 International Conference on Biometrics (ICB).

[116]  P. Schmid,et al.  Dynamic mode decomposition of numerical and experimental data , 2008, Journal of Fluid Mechanics.

[117]  J. van Leeuwen,et al.  Audio- and Video-Based Biometric Person Authentication , 2001, Lecture Notes in Computer Science.

[118]  Xiaoyang Tan,et al.  Enhanced Local Texture Feature Sets for Face Recognition Under Difficult Lighting Conditions , 2007, IEEE Transactions on Image Processing.

[119]  David Zhang,et al.  User Authentication Using Fusion of Face and Palmprint , 2009, Int. J. Image Graph..

[120]  Arun Ross,et al.  Learning user-specific parameters in a multibiometric system , 2002, Proceedings. International Conference on Image Processing.

[121]  Sébastien Marcel,et al.  Anti-spoofing, Face Databases , 2015, Encyclopedia of Biometrics.

[122]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[123]  Venu Govindaraju,et al.  Evaluation of biometric spoofing in a multimodal system , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[124]  Julian Fiérrez,et al.  Author's Personal Copy Future Generation Computer Systems a High Performance Fingerprint Liveness Detection Method Based on Quality Related Features , 2022 .

[125]  Bill Triggs,et al.  Histograms of oriented gradients for human detection , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[126]  Shih-Fu Chang,et al.  Single-view recaptured image detection based on physics-based features , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[127]  Sébastien Marcel,et al.  Bob: a free signal processing and machine learning toolbox for researchers , 2012, ACM Multimedia.

[128]  Arun Ross,et al.  A Bayesian approach for modeling sensor influence on quality, liveness and match score values in fingerprint verification , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).

[129]  Lin Sun,et al.  Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera , 2007, 2007 IEEE 11th International Conference on Computer Vision.

[130]  Sébastien Marcel,et al.  Spoofing Attacks To 2D Face Recognition Systems With 3D Masks , 2013, ICB 2013.

[131]  Farzin Deravi,et al.  Spoofing attempt detection using gaze colocation , 2013, 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG).

[132]  Alvin F. Martin,et al.  The NIST 1999 Speaker Recognition Evaluation - An Overview , 2000, Digit. Signal Process..

[133]  Stephen M. Matyas,et al.  A Biometric Standard for Information Management and Security , 2000, Comput. Secur..

[134]  Alexander Werner,et al.  Avoiding replay-attacks in a face recognition system using head-pose estimation , 2003, 2003 IEEE International SOI Conference. Proceedings (Cat. No.03CH37443).

[135]  Sébastien Marcel,et al.  Evaluation Methodologies , 2014, Handbook of Biometric Anti-Spoofing.

[136]  Sébastien Marcel,et al.  Can face anti-spoofing countermeasures work in a real world scenario? , 2013, 2013 International Conference on Biometrics (ICB).

[137]  Tieniu Tan,et al.  Live face detection based on the analysis of Fourier spectra , 2004, SPIE Defense + Commercial Sensing.

[138]  Josef Bigün,et al.  Non-intrusive liveness detection by face images , 2009, Image Vis. Comput..

[139]  Jean-Luc Dugelay,et al.  Countermeasure for the protection of face recognition systems against mask attacks , 2013, 2013 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG).

[140]  Bruce A. Draper,et al.  Preliminary studies on the Good, the Bad, and the Ugly face recognition challenge problem , 2012, 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[141]  Radford M. Neal A new view of the EM algorithm that justifies incremental and other variants , 1993 .

[142]  Gian Luca Marcialis,et al.  Robustness analysis of likelihood ratio score fusion rule for multimodal biometric systems under spoof attacks , 2011, 2011 Carnahan Conference on Security Technology.

[143]  Samy Bengio,et al.  Database, protocols and tools for evaluating score-level fusion algorithms in biometric authentication , 2006, Pattern Recognit..

[144]  Kuldip K. Paliwal,et al.  Fast features for face authentication under illumination direction changes , 2003, Pattern Recognit. Lett..

[145]  Samy Bengio,et al.  The Expected Performance Curve , 2003, ICML 2003.

[146]  Rolf P. Würtz,et al.  Face Recognition with Disparity Corrected Gabor Phase Differences , 2012, ICANN.

[147]  Joachim M. Buhmann,et al.  Non-parametric similarity measures for unsupervised texture segmentation and image retrieval , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[148]  Sébastien Marcel,et al.  On the effectiveness of local binary patterns in face anti-spoofing , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).

[149]  Frank Stajano,et al.  The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes , 2012, 2012 IEEE Symposium on Security and Privacy.

[150]  David Windridge,et al.  Detection of Face Spoofing Using Visual Dynamics , 2015, IEEE Transactions on Information Forensics and Security.

[151]  Aaron E. Rosenberg,et al.  Speaker background models for connected digit password speaker verification , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.

[152]  Alvin F. Martin,et al.  NIST Speaker Recognition Evaluation Chronicles - Part 2 , 2006, 2006 IEEE Odyssey - The Speaker and Language Recognition Workshop.

[153]  Slobodan Kalajdziski,et al.  Protein Function Prediction Based on Neighborhood Profiles , 2009, ICT Innovations.

[154]  Stephanie Schuckers,et al.  Spoofing and Anti-Spoofing Measures , 2002, Inf. Secur. Tech. Rep..

[155]  S. P. Lloyd,et al.  Least squares quantization in PCM , 1982, IEEE Trans. Inf. Theory.

[156]  Matthias W. Seeger,et al.  Using the Nyström Method to Speed Up Kernel Machines , 2000, NIPS.

[157]  Zoran A. Ivanovski,et al.  Automatic image orientation detection with prior hierarchical content-based classification , 2011, 2011 18th IEEE International Conference on Image Processing.

[158]  Sébastien Marcel,et al.  Biometrics Evaluation Under Spoofing Attacks , 2014, IEEE Transactions on Information Forensics and Security.

[159]  Gaël Varoquaux,et al.  Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..

[160]  Sébastien Marcel,et al.  Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[161]  Frédo Durand,et al.  Eulerian video magnification for revealing subtle changes in the world , 2012, ACM Trans. Graph..