Hill-climbing attack to an Eigenface-based face verification system
暂无分享,去创建一个
Julian Fierrez | Javier Ortega-Garcia | Javier Galbally | Chris McCool | Sebastien Marcel | Julian Fierrez | J. Ortega-Garcia | S. Marcel | Javier Galbally | C. McCool
[1] Jiri Matas,et al. XM2VTSDB: The Extended M2VTS Database , 1999 .
[2] J. Fierrez-Aguilar,et al. Hill-Climbing and Brute-Force Attacks on Biometric Systems: A Case Study in Match-on-Card Fingerprint Verification , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.
[3] Andy Adler,et al. Biometric System Security , 2008 .
[4] Alex Pentland,et al. Face recognition using eigenfaces , 1991, Proceedings. 1991 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[5] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[6] Sudeep Sarkar,et al. From Scores to Face Templates: A Model-Based Approach , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[7] Julian Fiérrez,et al. Bayesian Hill-Climbing Attack and Its Application to Signature Verification , 2007, ICB.
[8] Anil K. Jain,et al. Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.
[9] Patrick J. Flynn,et al. Overview of the face recognition grand challenge , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[10] Andy Adler. Sample images can be independently restored from face recognition templates , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).