Biometric Antispoofing Methods: A Survey in Face Recognition
暂无分享,去创建一个
[1] Julian Fiérrez,et al. An evaluation of indirect attacks and countermeasures in fingerprint verification systems , 2011, Pattern Recognit. Lett..
[2] Enrique Argones-Rúa,et al. Audio-visual speech asynchrony detection using co-inertia analysis and coupled hidden markov models , 2009, Pattern Analysis and Applications.
[3] Bela Gipp,et al. ePassport: The World's New Electronic Passport , 2007 .
[4] Patrick J. Flynn,et al. A survey of approaches and challenges in 3D and multi-modal 3D + 2D face recognition , 2006, Comput. Vis. Image Underst..
[5] Jean-Luc Dugelay,et al. Reflectance analysis based countermeasure technique to detect face mask attacks , 2013, 2013 18th International Conference on Digital Signal Processing (DSP).
[6] Lin Sun,et al. TIR/VIS Correlation for Liveness Detection in Face Recognition , 2011, CAIP.
[7] Arun Ross,et al. Combining match scores with liveness values in a fingerprint verification system , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[8] Stephanie Schuckers,et al. Multimodal fusion vulnerability to non-zero effort (spoof) imposters , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[9] Sébastien Marcel,et al. Counter-measures to photo attacks in face recognition: A public database and a baseline , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[10] Josef Bigün,et al. Verifying liveness by multiple experts in face biometrics , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[11] H. Hadow. The National Physical Laboratory , 1913, Nature.
[12] Sébastien Marcel,et al. Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[13] Anil K. Jain,et al. Skilled Forgery Detection in On-Line Signatures: A Multimodal Approach , 2004, ICBA.
[14] Jukka Komulainen,et al. Face Spoofing Detection Using Dynamic Texture , 2012, ACCV Workshops.
[15] Harold Cummins. Counterfeit Finger-Prints , 1934 .
[16] Patrick J. Flynn,et al. A sparse representation approach to face matching across plastic surgery , 2012, 2012 IEEE Workshop on the Applications of Computer Vision (WACV).
[17] Robert H. Deng,et al. Understanding OSN-based facial disclosure against face authentication systems , 2014, AsiaCCS.
[18] T. Tan,et al. Learning Hierarchical Visual Codebook for Iris Liveness Detection , 2011 .
[19] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[20] Zahid Akhtar Shabbeer Ahmad Momin. Security of multimodal biometric systems against spoof attacks , 2012 .
[21] Sébastien Marcel,et al. Anti-spoofing in Action: Joint Operation with a Verification System , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops.
[22] Seongbeak Yoon,et al. Masked fake face detection using radiance measurements. , 2009, Journal of the Optical Society of America. A, Optics, image science, and vision.
[23] Bodade M. Rajesh,et al. Fake Iris Detection: A Holistic Approach , 2011 .
[24] Chong D. Lee. Finger-Prints Can Be Forged , 1934 .
[25] Farzin Deravi,et al. Liveness Detection Using Gaze Collinearity , 2012, 2012 Third International Conference on Emerging Security Technologies.
[26] Alessandra Lumini,et al. Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[27] Nalini K. Ratha,et al. Biometric perils and patches , 2002, Pattern Recognit..
[28] Gian Luca Marcialis,et al. LivDet 2013 Fingerprint Liveness Detection Competition 2013 , 2013, 2013 International Conference on Biometrics (ICB).
[29] Yi Li,et al. Face Liveness Detection from a Single Image with Sparse Low Rank Bilinear Discriminative Model , 2010, ECCV.
[30] F. Roli,et al. Security evaluation of biometric authentication systems under real spoofing attacks , 2012, IET Biom..
[31] Sébastien Marcel,et al. On the vulnerability of finger vein recognition to spoofing , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).
[32] Sébastien Marcel,et al. Spoofing 2D face recognition systems with 3D masks , 2013, 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG).
[33] Sudeep Sarkar,et al. From Scores to Face Templates: A Model-Based Approach , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[34] Bin Qin,et al. The Anti-spoofing Study of Vein Identification System , 2009, 2009 International Conference on Computational Intelligence and Security.
[35] Shengcai Liao,et al. Face liveness detection with component dependent descriptor , 2013, 2013 International Conference on Biometrics (ICB).
[36] Michael David Kelly,et al. Visual identification of people by computer , 1970 .
[37] Robert K. Rowe,et al. Spoof Detection Schemes , 2008 .
[38] Sébastien Marcel,et al. Can face anti-spoofing countermeasures work in a real world scenario? , 2013, 2013 International Conference on Biometrics (ICB).
[39] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[40] Tieniu Tan,et al. Live face detection based on the analysis of Fourier spectra , 2004, SPIE Defense + Commercial Sensing.
[41] K. Davis,et al. Automatic Recognition of Spoken Digits , 1952 .
[42] Jukka Komulainen,et al. The 2nd competition on counter measures to 2D face spoofing attacks , 2013, 2013 International Conference on Biometrics (ICB).
[43] Christoph Busch,et al. Presentation attack detection methods for fingerprint recognition systems: a survey , 2014, IET Biom..
[44] Johan Blommé. Evaluation of biometric security systems against artificial fingers , 2003 .
[45] Gian Luca Marcialis,et al. Evaluation of serial and parallel multibiometric systems under spoofing attacks , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[46] Nguyen Minh Duc. Your face is NOT your password Face Authentication ByPassing Lenovo – Asus – Toshiba , 2009 .
[47] Stan Z. Li,et al. Face liveness detection by learning multispectral reflectance distributions , 2011, Face and Gesture 2011.
[48] Michele Nappi,et al. Moving face spoofing detection via 3D projective invariants , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[49] Asad Ali,et al. Biometric liveness detection using gaze information , 2015 .
[50] J. Herrero. Vulnerabilities and attack protection in security systems based on biometric recognition , 2009 .
[51] I. Pavlidis,et al. The imaging issue in an automatic face/disguise detection system , 2000, Proceedings IEEE Workshop on Computer Vision Beyond the Visible Spectrum: Methods and Applications (Cat. No.PR00640).
[52] David J. Kriegman,et al. From Few to Many: Illumination Cone Models for Face Recognition under Variable Lighting and Pose , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[53] 丁晓青,et al. Face Live Detection Method Based on Physiological Motion Analysis , 2009 .
[54] Matti Pietikäinen,et al. Complementary countermeasures for detecting scenic face spoofing attacks , 2013, 2013 International Conference on Biometrics (ICB).
[55] Danilo Gligoroski,et al. Walk the Walk: Attacking Gait Biometrics by Imitation , 2010, ISC.
[56] P Margot,et al. Fingerprint forgery--a survey. , 2001, Journal of forensic sciences.
[57] Matti Pietikäinen,et al. Context based face anti-spoofing , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[58] Arun Ross,et al. Generating Synthetic Irises by Feature Agglomeration , 2006, 2006 International Conference on Image Processing.
[59] Sébastien Marcel,et al. Motion-based counter-measures to photo attacks in face recognition , 2014, IET Biom..
[60] Alessandra Lumini,et al. An evaluation of direct attacks using fake fingers generated from ISO templates , 2010, Pattern Recognit. Lett..
[61] Richa Singh,et al. Disguise detection and face recognition in visible and thermal spectrums , 2013, 2013 International Conference on Biometrics (ICB).
[62] Josef Bigün,et al. Non-intrusive liveness detection by face images , 2009, Image Vis. Comput..
[63] Tieniu Tan,et al. A study of multibiometric traits of identical twins , 2010, Defense + Commercial Sensing.
[64] Kang Ryoung Park,et al. Face liveness detection based on texture and frequency analyses , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[65] Jean-Luc Dugelay,et al. Countermeasure for the protection of face recognition systems against mask attacks , 2013, 2013 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG).
[66] Jana Dittmann,et al. Printed fingerprints at crime scenes: a faster detection of malicious traces using scans of confocal microscopes , 2013, Electronic Imaging.
[67] Jang-Hee Yoo,et al. Liveness Detection for Embedded Face Recognition System , 2008 .
[68] Réjean Plamondon,et al. Synthetic on-line signature generation. Part I: Methodology and algorithms , 2012, Pattern Recognit..
[69] Gian Luca Marcialis,et al. Fingerprint silicon Replicas: Static and Dynamic Features for Vitality Detection Using an Optical Capture Device , 2008, Int. J. Image Graph..
[70] Sébastien Marcel,et al. On the effectiveness of local binary patterns in face anti-spoofing , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).
[71] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[72] Venu Govindaraju,et al. Evaluation of biometric spoofing in a multimodal system , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[73] Michael Wagner,et al. "liveness" Verification in Audio-video Authentication , 2004, INTERSPEECH.
[74] Pradeep Buddharaju,et al. Physiology-Based Face Recognition in the Thermal Infrared Spectrum , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[75] Hong Li,et al. A liveness detection method for face recognition based on optical flow field , 2009, 2009 International Conference on Image Analysis and Signal Processing.
[76] Michael Wagner,et al. Liveness detection using cross-modal correlations in face-voice person authentication , 2005, INTERSPEECH.
[77] Jean-Luc Dugelay,et al. On the vulnerability of face recognition systems to spoofing mask attacks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[78] N. Kose,et al. Classification of captured and recaptured images to detect photograph spoofing , 2012, 2012 International Conference on Informatics, Electronics & Vision (ICIEV).
[79] Rolf Ingold,et al. A New Forgery Scenario Based on Regaining Dynamics of Signature , 2007, ICB.
[80] Anderson Rocha,et al. Face spoofing detection through partial least squares and low-level descriptors , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[81] Himanshu S. Bhatt,et al. Plastic Surgery: A New Dimension to Face Recognition , 2010, IEEE Transactions on Information Forensics and Security.
[82] Sangyoun Lee,et al. Face liveness detection using variable focusing , 2013, 2013 International Conference on Biometrics (ICB).
[83] Tieniu Tan,et al. Contact Lens Detection Based on Weighted LBP , 2010, 2010 20th International Conference on Pattern Recognition.
[84] Ioannis A. Kakadiaris,et al. Twins 3D face recognition challenge , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[85] Sébastien Marcel,et al. Spoofing Face Recognition With 3D Masks , 2014, IEEE Transactions on Information Forensics and Security.
[86] Samarth Bharadwaj,et al. Computationally Efficient Face Spoofing Detection with Motion Magnification , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops.
[87] George W. Quinn,et al. Distinguishing identical twins by face recognition , 2011, Face and Gesture 2011.
[88] Himanshu S. Bhatt,et al. Recognizing Surgically Altered Face Images Using Multiobjective Evolutionary Algorithm , 2013, IEEE Transactions on Information Forensics and Security.
[89] Stan Z. Li,et al. Handbook of Biometric Anti-Spoofing , 2014, Advances in Computer Vision and Pattern Recognition.
[90] Jang-Hee Yoo,et al. A motion and similarity-based fake detection method for biometric face recognition systems , 2011, IEEE Transactions on Consumer Electronics.
[91] Junjie Yan,et al. Face liveness detection by exploring multiple scenic clues , 2012, 2012 12th International Conference on Control Automation Robotics & Vision (ICARCV).
[92] Francine J. Prokoski,et al. Infrared Identification of Faces and Body Parts , 1996 .
[93] Yun Q. Shi,et al. Is physics-based liveness detection truly possible with a single image? , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.
[94] 박규태,et al. Liveness detection method and apparatus in video image , 2007 .
[95] Julian Fierrez. Adapted fusion schemes for multimodal biometric authentication (Esquemas adaptados de fusión para autenticación biométrica multimodal) , 2006 .
[96] Sharath Pankanti,et al. Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..
[97] Bruce Schneier,et al. Inside risks: the uses and abuses of biometrics , 1999, CACM.
[98] Satoshi Hoshino,et al. Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.
[99] Bruce Schneier,et al. Secrets and Lies: Digital Security in a Networked World , 2000 .
[100] Matti Pietikäinen,et al. Face spoofing detection from single images using texture and local shape analysis , 2012, IET Biom..
[101] Andreas Uhl,et al. Attacking Iris Recognition: An Efficient Hill-Climbing Technique , 2010, 2010 20th International Conference on Pattern Recognition.
[102] Jean-Luc Dugelay,et al. Shape and Texture Based Countermeasure to Protect Face Recognition Systems against Mask Attacks , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops.
[103] R. Sanchez-Reillo,et al. Evaluation methodology for fake samples detection in biometrics , 2008, 2008 42nd Annual IEEE International Carnahan Conference on Security Technology.
[104] Tieniu Tan,et al. Counterfeit iris detection based on texture analysis , 2008, 2008 19th International Conference on Pattern Recognition.
[105] Javier Ruiz-del-Solar,et al. A comparative study of thermal face recognition methods in unconstrained environments , 2012, Pattern Recognit..
[106] Junjie Yan,et al. A face antispoofing database with diverse attacks , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[107] Arun Ross,et al. Can facial cosmetics affect the matching accuracy of face recognition systems? , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[108] Farzin Deravi,et al. A review of speech-based bimodal recognition , 2002, IEEE Trans. Multim..
[109] Norman Poh,et al. Biometric system design under zero and non-zero effort attacks , 2013, 2013 International Conference on Biometrics (ICB).
[110] Arun Ross,et al. A Survey on Anti-Spoofing Schemes for Fingerprint Recognition Systems , 2014 .
[111] Lin Sun,et al. Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera , 2007, 2007 IEEE 11th International Conference on Computer Vision.
[112] Jana Dittmann,et al. High-resolution printed amino acid traces: a first-feature extraction approach for fingerprint forgery detection , 2012, Other Conferences.
[113] Sébastien Marcel,et al. On the vulnerability of face verification systems to hill-climbing attacks , 2010, Pattern Recognit..
[114] Stephanie Schuckers,et al. Increase the Security of Multibiometric Systems by Incorporating a Spoofing Detection Algorithm in the Fusion Mechanism , 2011, MCS.
[115] Pietro Coli,et al. Vitality detection in personal authentication systems using fingerprints , 2008 .
[116] Fabio Roli,et al. Fusion of multiple clues for photo-attack detection in face recognition systems , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[117] V. Bhagavatula. Real-Time Face Detection and Motion Analysis With Application in "Liveness" Assessment , 2007 .
[118] Jana Dittmann,et al. Printed fingerprints: a framework and first results towards detection of artificially printed latent fingerprints for forensics , 2011, Electronic Imaging.
[119] Gian Luca Marcialis,et al. LivDet 2011 — Fingerprint liveness detection competition 2011 , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[120] Amani Al-Ajlan. Survey on fingerprint liveness detection , 2013, 2013 International Workshop on Biometrics and Forensics (IWBF).
[121] Massimo Tistarelli,et al. Structural Similarity based image quality map for face recognition across plastic surgery , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[122] Mohammed Rizwan,et al. Multimodal Biometric Fusion: Performance under Spoof Attacks , 2011, J. Intell. Syst..
[123] Jiang-Wei Li,et al. Eye blink detection based on multiple Gabor response waves , 2008, 2008 International Conference on Machine Learning and Cybernetics.
[124] Sébastien Marcel,et al. Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition , 2014, IEEE Transactions on Image Processing.
[125] Trevor Hastie,et al. The Elements of Statistical Learning , 2001 .
[126] Zhaohui Wu,et al. Liveness Detection for Face Recognition , 2008 .
[127] Marie Sandström. Liveness Detection in Fingerprint Recognition Systems , 2004 .
[128] Sébastien Marcel,et al. LBP - TOP Based Countermeasure against Face Spoofing Attacks , 2012, ACCV Workshops.
[129] Anderson Rocha,et al. Video-Based Face Spoofing Detection through Visual Rhythm Analysis , 2012, 2012 25th SIBGRAPI Conference on Graphics, Patterns and Images.
[130] Kevin W. Bowyer,et al. LivDet-iris 2013 - Iris Liveness Detection Competition 2013 , 2014, IEEE International Joint Conference on Biometrics.
[131] Robert M. Jarvis,et al. The Adventure of the Norwood Builder: A Lawyerly Annotated Edition , 2015 .
[132] Matti Pietikäinen,et al. Competition on counter measures to 2-D facial spoofing attacks , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[133] Lin Sun,et al. Monocular camera-based face liveness detection by combining eyeblink and scene context , 2011, Telecommun. Syst..
[134] Julian Fiérrez,et al. Evaluation of direct attacks to fingerprint verification systems , 2011, Telecommun. Syst..
[135] Anil K. Jain,et al. Analysis of facial features in identical twins , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[136] Emanuela Marasco. Secure Multibiometric Systems , 2010 .
[137] Sanjay N. Talbar,et al. Dynamic iris localisation: a novel approach suitable for fake iris detection , 2009 .
[138] Shengcai Liao,et al. Face liveness detection using 3D structure recovered from a single camera , 2013, 2013 International Conference on Biometrics (ICB).
[139] Nicholas W. D. Evans,et al. On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).
[140] Gian Luca Foresti,et al. MoBio_LivDet: Mobile biometric liveness detection , 2014, 2014 11th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).
[141] Michael Wagner,et al. UCBN: A New Audio-Visual Broadcast News Corpus for Multimodal Speaker Verification Studies , 2006 .
[142] Josef Bigün,et al. Evaluating liveness by face images and the structure tensor , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).
[143] Gian Luca Marcialis,et al. First International Fingerprint Liveness Detection Competition - LivDet 2009 , 2009, ICIAP.
[144] Conrad Sanderson,et al. The VidTIMIT Database , 2002 .
[145] Mita Nasipuri,et al. Automated thermal face recognition based on minutiae extraction , 2013, Int. J. Comput. Intell. Stud..
[146] Julian Fiérrez,et al. Direct Attacks Using Fake Images in Iris Verification , 2008, BIOID.
[147] Anderson Rocha,et al. Face liveness detection under bad illumination conditions , 2011, 2011 18th IEEE International Conference on Image Processing.
[148] Matti Pietikäinen,et al. Face spoofing detection from single images using micro-texture analysis , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[149] J. Bigun,et al. Assuring liveness in biometric identity authentication by real-time face tracking , 2004, Proceedings of the 2004 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety, 2004. CIHSPS 2004..
[150] J. L. Wayman,et al. Best practices in testing and reporting performance of biometric devices. , 2002 .