Identities, forgeries and disguises
暂无分享,去创建一个
Walid Karam | Chafic Mokbel | Gérard Chollet | Dijana Petrovska-Delacrétaz | Patrick Perrot | Sanjay Ganesh Kanade | C. Mokbel | Walid Karam | D. Petrovska-Delacrétaz | S. Kanade | Patrick Perrot | Gérard Chollet
[1] Gérard Chollet,et al. Detection and Recognition of voice disguise , 2007 .
[2] Ian H. Witten,et al. Detecting Replay Attacks in Audiovisual Identity Verification , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[3] Ricardo Molina de Figueiredo,et al. A report on the acoustic effects of one type of disguise , 2013 .
[4] Terrance E. Boult,et al. Revocable fingerprint biotokens: accuracy and security analysis , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[5] Gérard Chollet,et al. Making talking-face authentication robust to deliberate imposture , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[6] Loris Nanni,et al. An improved BioHashing for human authentication , 2007, Pattern Recognit..
[7] B. V. K. Vijaya Kumar,et al. Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[8] G. Chollet,et al. The BioSecure Talking-Face Reference System , 2006 .
[9] Hui Zhang,et al. Image-Based 3D Face Modeling System , 2005, EURASIP J. Adv. Signal Process..
[10] Walid Karam,et al. Audio-Visual Identity Verification and Robustness to Imposture , 2009, ICB.
[11] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[12] S. Kanade,et al. Three factor scheme for biometric-based cryptographic key regeneration using iris , 2008, 2008 Biometrics Symposium.
[13] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[14] Gérard Chollet,et al. The question of disguised voice , 2008 .
[15] Bernadette Dorizzi,et al. Cancelable iris biometrics and using Error Correcting Codes to reduce variability in biometric data , 2009, CVPR.
[16] Shang-Hong Lai,et al. Efficient 3D Face Reconstruction from a Single 2D Image by Combining Statistical and Geometrical Information , 2006, ACCV.
[17] Hassan Ugail,et al. Reconstruction of 3D Human Facial Images Using Partial Differential Equations , 2007, J. Comput..
[18] G. Chollet,et al. The 1st BioSecure Residential Workshop , 2005, ISPA 2005. Proceedings of the 4th International Symposium on Image and Signal Processing and Analysis, 2005..
[19] Gérard Chollet,et al. Audiovisual Speech Synchrony Measure: Application to Biometrics , 2007, EURASIP J. Adv. Signal Process..
[20] Walid Karam,et al. Some results from the biosecure talking face evaluation campaign , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[21] Alexander G. Hauptmann,et al. Towards robust face recognition from multiple views , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[22] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[23] Bernadette Dorizzi,et al. Guide to Biometric Reference Systems and Performance Evaluation , 2009 .
[24] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[25] Gérard Chollet,et al. Audio-visual Identity Verification: An Introductory Overview , 2005, WNSP.
[26] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[27] Gérard Chollet,et al. MEASURING AUDIO AND VISUAL SPEECH SYNCHRONY: METHODS AND APPLICATIONS , 2006 .
[28] S. Kanade,et al. Multi-biometrics based cryptographic key regeneration scheme , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[29] Feng Hao,et al. Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.
[30] B. Abboud,et al. Appearance based lip tracking and cloning on speaking faces , 2005, ISPA 2005. Proceedings of the 4th International Symposium on Image and Signal Processing and Analysis, 2005..
[31] Gérard Chollet,et al. Vocal Forgery in Forensic Sciences , 2009, e-Forensics.
[32] S. H. Amin,et al. Analysis of 3D Face Reconstruction , 2007, 14th International Conference on Image Analysis and Processing (ICIAP 2007).
[33] Matthew Sorell,et al. Forensics in Telecommunications, Information and Multimedia , 2009, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.
[34] Walid Karam,et al. Talking-Face Identity Verification, Audiovisual Forgery, and Robustness Issues , 2009, EURASIP J. Adv. Signal Process..
[35] Gérard Chollet,et al. Voice forgery using ALISP: indexation in a client memory , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[36] Bernadette Dorizzi,et al. Obtaining cryptographic keys using feature level fusion of iris and face biometrics for secure user authentication , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops.
[37] Yepeng Guan,et al. Automatic 3D Face Reconstruction based on Single 2D Image , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).
[38] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[39] H. Masthoff. A report on a voice disguise experiment , 2013 .