Towards Robust Evaluation of Face Morphing Detection
暂无分享,去创建一个
Luuk J. Spreeuwers | Raymond N. J. Veldhuis | Maikel Schils | L. Spreeuwers | R. Veldhuis | Maikel Schils
[1] Robin S S Kramer,et al. Fraudulent ID using face morphs: Experiments on human and automatic recognition , 2017, PloS one.
[2] Esa Rahtu,et al. BSIF: Binarized statistical image features , 2012, Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012).
[3] Fred Nicolls,et al. Active shape models with SIFT descriptors and MARS , 2015, 2014 International Conference on Computer Vision Theory and Applications (VISAPP).
[4] Kiran B. Raja,et al. On the vulnerability of face recognition systems towards morphed face attacks , 2017, 2017 5th International Workshop on Biometrics and Forensics (IWBF).
[5] Aleix M. Martinez,et al. The AR face database , 1998 .
[6] Patrick J. Flynn,et al. Overview of the face recognition grand challenge , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[7] A. Martínez,et al. The AR face databasae , 1998 .
[8] D. T. Lee,et al. Two algorithms for constructing a Delaunay triangulation , 1980, International Journal of Computer & Information Sciences.
[9] Harry Wechsler,et al. The FERET database and evaluation procedure for face-recognition algorithms , 1998, Image Vis. Comput..
[10] Davide Maltoni,et al. The magic passport , 2014, IEEE International Joint Conference on Biometrics.
[11] Kiran B. Raja,et al. Detecting morphed face images , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[12] Davis E. King,et al. Dlib-ml: A Machine Learning Toolkit , 2009, J. Mach. Learn. Res..