Image Quality Assessment for Fake Biometric Detection
暂无分享,去创建一个
[1] Alan C. Bovik,et al. A Statistical Evaluation of Recent Full Reference Image Quality Assessment Algorithms , 2006, IEEE Transactions on Image Processing.
[2] Paul S. Fisher,et al. Image quality measures and their performance , 1995, IEEE Trans. Commun..
[3] Zhou Wang,et al. No-reference perceptual quality assessment of JPEG compressed images , 2002, Proceedings. International Conference on Image Processing.
[4] Alessandra Lumini,et al. Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[5] Arun Ross,et al. Generating Synthetic Irises by Feature Agglomeration , 2006, 2006 International Conference on Image Processing.
[6] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[7] Alan C. Bovik,et al. A Two-Step Framework for Constructing Blind Image Quality Indices , 2010, IEEE Signal Processing Letters.
[8] K. J. Ray Liu,et al. Forensic detection of image manipulation using statistical intrinsic fingerprints , 2010, IEEE Transactions on Information Forensics and Security.
[9] David S. Doermann,et al. No-Reference Image Quality Assessment Using Visual Codebooks , 2012, IEEE Transactions on Image Processing.
[10] Alan C. Bovik,et al. Image information and visual quality , 2006, IEEE Trans. Image Process..
[11] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[12] Sébastien Marcel,et al. Counter-measures to photo attacks in face recognition: A public database and a baseline , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[13] Arun Ross,et al. Handbook of Multibiometrics , 2006, The Kluwer international series on biometrics.
[14] Bülent Sankur,et al. Statistical evaluation of image quality measures , 2002, J. Electronic Imaging.
[15] Zhou Wang,et al. On the Mathematical Properties of the Structural Similarity Index , 2012, IEEE Transactions on Image Processing.
[16] Robert K. Rowe,et al. Spoof Detection Schemes , 2008 .
[17] Benoit Geller,et al. Blind estimation of timing and carrier frequency offsets in OFDM systems , 2007, 2009 17th European Signal Processing Conference.
[18] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[19] Nasir D. Memon,et al. Image manipulation detection , 2006, J. Electronic Imaging.
[20] Alan C. Bovik,et al. RRED Indices: Reduced Reference Entropic Differencing for Image Quality Assessment , 2012, IEEE Transactions on Image Processing.
[21] Sharath Pankanti,et al. Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..
[22] Gian Luca Marcialis,et al. Evaluation of serial and parallel multibiometric systems under spoofing attacks , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).