Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication
暂无分享,去创建一个
Robert H. Deng | Yingjiu Li | Yan Li | Qiang Yan | Hancong Kong | Yingjiu Li | R. Deng | Yan Li | Qiang Yan | Hancong Kong
[1] Matti Pietikäinen,et al. Competition on counter measures to 2-D facial spoofing attacks , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[2] S. J. Tupling,et al. Use of cardan angles to locate rigid bodies in three-dimensional space , 1987, Medical and Biological Engineering and Computing.
[3] Jens Timmer,et al. Characteristics of hand tremor time series , 1993, Biological Cybernetics.
[4] Josef Bigün,et al. Non-intrusive liveness detection by face images , 2009, Image Vis. Comput..
[5] R. V. Benson. Euclidean Geometry and Convexity , 1966 .
[6] Azriel Rosenfeld,et al. Face recognition: A literature survey , 2003, CSUR.
[7] Matti Pietikäinen,et al. Face spoofing detection from single images using micro-texture analysis , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[8] Xavier Maldague,et al. Infrared face recognition: A literature review , 2013, The 2013 International Joint Conference on Neural Networks (IJCNN).
[9] Ehud Rivlin,et al. Robust 3D Head Tracking Using Camera Pose Estimation , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[10] D. Hosmer,et al. Logistic Regression, Conditional , 2005 .
[11] Mohan M. Trivedi,et al. Head Pose Estimation in Computer Vision: A Survey , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[12] Jang-Hee Yoo,et al. Liveness Detection for Embedded Face Recognition System , 2008 .
[13] A. Acquisti,et al. Privacy in the Age of Augmented Reality , 2011 .
[14] Nir Friedman,et al. Bayesian Network Classifiers , 1997, Machine Learning.
[15] Takeo Kanade,et al. Multi-PIE , 2008, 2008 8th IEEE International Conference on Automatic Face & Gesture Recognition.
[16] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[17] Jason M. Saragih,et al. Deformable Face Alignment via Local Measurements and Global Constraints , 2013 .
[18] Frank Stenger,et al. Integration Formulae Based on the Trapezoidal Formula , 1973 .
[19] Naser Damer,et al. 2D face liveness detection: An overview , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).
[20] Robert H. Deng,et al. Understanding OSN-based facial disclosure against face authentication systems , 2014, AsiaCCS.
[21] Arun Ross,et al. An introduction to biometrics , 2008, ICPR 2008.
[22] Meinard Müller,et al. Information retrieval for music and motion , 2007 .
[23] Anil K. Jain,et al. A Multispectral Whole-Hand Biometric Authentication System , 2007, 2007 Biometrics Symposium.
[24] Alessandro Acquisti,et al. Silent Listeners: The Evolution of Privacy and Disclosure on Facebook , 2013, J. Priv. Confidentiality.
[25] Juha Röning,et al. Recognizing Human Activities User-independently on Smartphones Based on Accelerometer Data , 2012, Int. J. Interact. Multim. Artif. Intell..
[26] Joseph Wilder,et al. Comparison of visible and infra-red imagery for face recognition , 1996, Proceedings of the Second International Conference on Automatic Face and Gesture Recognition.
[27] Hong Li,et al. A liveness detection method for face recognition based on optical flow field , 2009, 2009 International Conference on Image Analysis and Signal Processing.
[28] Andrea F. Abate,et al. 2D and 3D face recognition: A survey , 2007, Pattern Recognit. Lett..
[29] Terence Sim,et al. The CMU Pose, Illumination, and Expression Database , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[30] Mahmudur Rahman,et al. Seeing is not believing: visual verifications through liveness analysis using mobile devices , 2013, ACSAC.
[31] Heinrich Hußmann,et al. I Feel Like I'm Taking Selfies All Day!: Towards Understanding Biometric Authentication on Smartphones , 2015, CHI.
[32] Prasant Mohapatra,et al. Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones , 2014, MobiSys.
[33] F. Roli,et al. Security evaluation of biometric authentication systems under real spoofing attacks , 2012, IET Biom..
[34] Stephen A. McGuire,et al. Introductory Statistics , 2007, Technometrics.
[35] Berthold K. P. Horn,et al. Determining Optical Flow , 1981, Other Conferences.
[36] Matei Mancas,et al. Head Pose Estimation by Perspective-n-Point Solution Based on 2D Markerless Face Tracking , 2014, INTETAIN.
[37] Seungbin Moon,et al. An Efficient Hybrid Face Recognition Algorithm Using PCA and GABOR Wavelets , 2014 .
[38] J. Hanley,et al. The meaning and use of the area under a receiver operating characteristic (ROC) curve. , 1982, Radiology.
[39] Alan Bundy,et al. Dynamic Time Warping , 1984 .
[40] Lin Sun,et al. Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera , 2007, 2007 IEEE 11th International Conference on Computer Vision.
[41] David W. Hosmer,et al. Applied Logistic Regression , 1991 .
[42] M. W Gardner,et al. Artificial neural networks (the multilayer perceptron)—a review of applications in the atmospheric sciences , 1998 .
[43] L. O'Gorman,et al. Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.
[44] René Mayrhofer,et al. Towards face unlock: on the difficulty of reliably detecting faces on mobile phones , 2012, MoMM '12.
[45] Rene Mayrhofer,et al. Towards usable authentication on mobile phones : An evaluation of speaker and face recognition on off-the-shelf handsets , 2012 .