rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System
暂无分享,去创建一个
Erkam Uzun | Wenke Lee | Irfan Essa | Simon Pak Ho Chung | Irfan Essa | S. Chung | Erkam Uzun | W. Lee
[1] Junjie Yan,et al. A face antispoofing database with diverse attacks , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[2] Erkam Uzun,et al. A preliminary examination technique for audio evidence to distinguish speech from non-speech using objective speech quality measures , 2014, Speech Commun..
[3] Justus Thies,et al. Face2Face: real-time face capture and reenactment of RGB videos , 2019, Commun. ACM.
[4] Robert H. Deng,et al. Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication , 2015, CCS.
[5] Matti Pietikäinen,et al. Face spoofing detection from single images using micro-texture analysis , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[6] Hao Li,et al. Photorealistic Facial Texture Inference Using Deep Neural Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[7] James Philbin,et al. FaceNet: A unified embedding for face recognition and clustering , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[8] Uwe Aickelin,et al. An Audio CAPTCHA to Distinguish Humans from Computers , 2010, 2010 Third International Symposium on Electronic Commerce and Security.
[9] Anderson Rocha,et al. Video-Based Face Spoofing Detection through Visual Rhythm Analysis , 2012, 2012 25th SIBGRAPI Conference on Graphics, Patterns and Images.
[10] Shrikanth S. Narayanan,et al. A robust frontend for VAD: exploiting contextual, discriminative and spectral cues of human voice , 2013, INTERSPEECH.
[11] Jiangqun Ni,et al. A deep learning approach to detection of splicing and copy-move forgeries in images , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).
[12] Nguyen Minh Duc. Your face is NOT your password Face Authentication ByPassing Lenovo – Asus – Toshiba , 2009 .
[13] Ping Zhang,et al. A Simple Generic Attack on Text Captchas , 2016, NDSS.
[14] Shimon Whiteson,et al. LipNet: Sentence-level Lipreading , 2016, ArXiv.
[15] Alexander I. Rudnicky,et al. Pocketsphinx: A Free, Real-Time Continuous Speech Recognition System for Hand-Held Devices , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[16] Aleksandr Sizov,et al. ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge , 2015, INTERSPEECH.
[17] Lujo Bauer,et al. Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition , 2016, CCS.
[18] Yi Li,et al. Face Liveness Detection from a Single Image with Sparse Low Rank Bilinear Discriminative Model , 2010, ECCV.
[19] Ira Kemelmacher-Shlizerman,et al. What Makes Tom Hanks Look Like Tom Hanks , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[20] Fei Peng,et al. Discriminating natural images and computer generated graphics based on the impact of CFA interpolation on the correlation of PRNU , 2014, Digit. Investig..
[21] Jukka Komulainen,et al. The 2nd competition on counter measures to 2D face spoofing attacks , 2013, 2013 International Conference on Biometrics (ICB).
[22] G. Chetty,et al. Multi-Level Liveness Verification for Face-Voice Biometric Authentication , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.
[23] Stefanos Zafeiriou,et al. A 3D Morphable Model Learnt from 10,000 Faces , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[24] Jörg Schwenk,et al. UI Redressing Attacks on Android Devices , 2012 .
[25] Jukka Komulainen,et al. Face Spoofing Detection Using Colour Texture Analysis , 2016, IEEE Transactions on Information Forensics and Security.
[26] Jean-Luc Dugelay,et al. Reflectance analysis based countermeasure technique to detect face mask attacks , 2013, 2013 18th International Conference on Digital Signal Processing (DSP).
[27] Robert H. Deng,et al. Understanding OSN-based facial disclosure against face authentication systems , 2014, AsiaCCS.
[28] Israel Cohen,et al. Voice Activity Detection in Presence of Transient Noise Using Spectral Clustering , 2013, IEEE Transactions on Audio, Speech, and Language Processing.
[29] William J. Christmas,et al. A Multiresolution 3D Morphable Face Model and Fitting Framework , 2016, VISIGRAPP.
[30] Matthew Turk,et al. A Morphable Model For The Synthesis Of 3D Faces , 1999, SIGGRAPH.
[31] Zhizheng Wu,et al. Investigating gated recurrent neural networks for speech synthesis , 2016, ArXiv.
[32] Sébastien Marcel,et al. Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[33] Fei Peng,et al. Discrimination of natural images and computer generated graphics based on multi-fractal and regression analysis , 2017 .
[34] Chong Wang,et al. Deep Speech 2 : End-to-End Speech Recognition in English and Mandarin , 2015, ICML.
[35] Matti Pietikäinen,et al. Competition on counter measures to 2-D facial spoofing attacks , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[36] Alessia Amelio,et al. Response Time Analysis of Text-Based CAPTCHA by Association Rules , 2016, AIMSA.
[37] Yanick Fratantonio,et al. Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[38] Lin Sun,et al. Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera , 2007, 2007 IEEE 11th International Conference on Computer Vision.
[39] John C. Mitchell,et al. The End is Nigh: Generic Solving of Text-based CAPTCHAs , 2014, WOOT.
[40] Yun Q. Shi,et al. Is physics-based liveness detection truly possible with a single image? , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.
[41] Georgios Tzimiropoulos,et al. Large Pose 3D Face Reconstruction from a Single Image via Direct Volumetric CNN Regression , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[42] Sangyoun Lee,et al. Face liveness detection using variable focusing , 2013, 2013 International Conference on Biometrics (ICB).
[43] Qionghai Dai,et al. A data-driven approach for facial expression synthesis in video , 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition.
[44] Jan-Michael Frahm,et al. Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos , 2016, USENIX Security Symposium.
[45] Guoying Zhao,et al. A 3D Mask Face Anti-Spoofing Database with Real World Variations , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[46] Takahiro Okabe,et al. Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions , 2010, IEEE Transactions on Information Forensics and Security.
[47] Zhizheng Wu,et al. A study of speaker adaptation for DNN-based speech synthesis , 2015, INTERSPEECH.
[48] Richa Singh,et al. Detecting Silicone Mask-Based Presentation Attack via Deep Dictionary Learning , 2017, IEEE Transactions on Information Forensics and Security.
[49] Roberto Caldelli,et al. An analysis on attacker actions in fingerprint-copy attack in source camera identification , 2011, 2011 IEEE International Workshop on Information Forensics and Security.
[50] Sajad Shirali-Shahreza,et al. Verifying Human Users in Speech-Based Interactions , 2011, INTERSPEECH.
[51] Ming Yang,et al. DeepFace: Closing the Gap to Human-Level Performance in Face Verification , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.