Simulation of Border Control in an Ongoing Web-based Experiment for Estimating Morphing Detection Performance of Humans
暂无分享,去创建一个
[1] Alice J. O'Toole,et al. Comparison of human and computer performance across face recognition experiments , 2014, Image and Vision Computing.
[2] BuschChristoph,et al. Presentation Attack Detection Methods for Face Recognition Systems , 2017 .
[3] Jana Dittmann,et al. Automatic Generation and Detection of Visually Faultless Facial Morphs , 2017, VISIGRAPP.
[4] Davide Maltoni,et al. The magic passport , 2014, IEEE International Joint Conference on Biometrics.
[5] A. Burton,et al. Passport Officers’ Errors in Face Matching , 2014, PloS one.
[6] Tsuyoshi Murata,et al. {m , 1934, ACML.
[7] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[8] Sébastien Marcel,et al. Biometric Systems under Morphing Attacks: Assessment of Morphing Techniques and Vulnerability Reporting , 2017, 2017 International Conference of the Biometrics Special Interest Group (BIOSIG).
[9] Jana Dittmann,et al. Humans Vs. Algorithms: Assessment of Security Risks Posed by Facial Morphing to Identity Verification at Border Control , 2019, VISIGRAPP.
[10] V. Bruce,et al. Recognition of unfamiliar faces , 2000, Trends in Cognitive Sciences.
[11] David J Robertson,et al. Detecting morphed passport photos: a training and individual differences approach , 2018, Cognitive research: principles and implications.
[12] Robin S. S. Kramer,et al. Face morphing attacks: Investigating detection with humans and computers , 2019, Cognitive Research: Principles and Implications.
[13] Kiran B. Raja,et al. On the vulnerability of face recognition systems towards morphed face attacks , 2017, 2017 5th International Workshop on Biometrics and Forensics (IWBF).
[14] Davis E. King,et al. Dlib-ml: A Machine Learning Toolkit , 2009, J. Mach. Learn. Res..
[15] Davide Maltoni,et al. On the Effects of Image Alterations on Face Recognition Accuracy , 2016, Face Recognition Across the Imaging Spectrum.
[16] Jana Dittmann,et al. Extended StirTrace benchmarking of biometric and forensic qualities of morphed face images , 2018, IET Biom..
[17] PhillipsP. Jonathon,et al. Review ArticleEditor's Choice Article , 2014 .
[18] Anna Hilsmann,et al. Detection of Face Morphing Attacks by Deep Learning , 2017, IWDW.
[19] Danna Zhou,et al. d. , 1934, Microbial pathogenesis.
[20] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[21] Anna Hilsmann,et al. Accurate and Robust Neural Networks for Security Related Applications Exampled by Face Morphing Attacks , 2018, ArXiv.
[22] Robin S S Kramer,et al. Fraudulent ID using face morphs: Experiments on human and automatic recognition , 2017, PloS one.
[23] Jana Dittmann,et al. Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing , 2017, IH&MMSec.