Spoofing Attacks
|
Publications for keyword "Spoofing Attacks"
2015
On the use of client identity information for face anti-spoofing, and , in: IEEE Transactions on Information Forensics and Security, Special Issue on Biometric Anti-spoofing, 10(4):787-796, 2015 |
|
2014
On the Vulnerability of Finger Vein Recognition to Spoofing, , and , in: IEEE International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, Germay, pages 1 - 10, IEEE, 2014 |
|
2013
Spoofing Attacks To 2D Face Recognition Systems With 3D Masks, and , Idiap-RR-42-2013 |
|
2012
On the Effectiveness of Local Binary Patterns in Face Anti-spoofing, , and , Idiap-RR-19-2012 |
|
2011
Competition on Counter Measures to 2-D Facial Spoofing Attacks, , , , , , , , , , , , , , , , , , , , , , , and , in: Proceedings of IAPR IEEE International Joint Conference on Biometrics (IJCB), Washington DC, USA, 2011 |
|