최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기KSII Transactions on internet and information systems : TIIS, v.13 no.2, 2019년, pp.892 - 911
Ali, Zahid (Department of Computer Science and Engineering, Sogang University) , Park, Unsang (Department of Computer Science and Engineering, Sogang University)
Biometric recognition systems have been widely used for information security. Among the most popular biometric traits, there are fingerprint and face due to their high recognition accuracies. However, the security system that uses face recognition as the login method are vulnerable to face-spoofing ...
A. K. Jain and A. A. Ross, "Introduction to biometrics," Handbook of Biometrics, 1st ed., Springer, US, Ch. 1, pp. 1-22, 2008.
T. F. Pereira, A. Anjos, J. de Martino and S. Marcel, "Can face anti-spoofing countermeasures work in a real world scenario?" in Proc. of IEEE Int. Conf. on Biometrics, pp. 1-8, 2013.
M. D. Nguyen and Q. M. Bui, "Your face is not your password: Face authentication bypassing Lenovo - Asus - Toshiba," in Proc. of Black Hat conference, pp. 1-16, 2009.
J. Maatta, A. Hadid and M. Pietikainen, "Face spoofing detection from single images using micro-texture analysis," in Proc. of IEEE Int. Joint Conf. on Biometrics, pp. 1-7, 2011.
I. Chingovska, A. Anjos and S. Marcel, "On the effectiveness of local binary patterns in face anti-spoofing," in Proc. of IEEE Int. Conf. on Biometrics Special Interest Group, pp. 1-7, 2012.
V. R-Albacete, P. T-Gonzalez, F. A-Fernandez, "Direct attacks using fake images in iris verification," Biometrics and Identity Management, vol. 5372, pp. 181-190, 2008.
T. Matsumoto, H. Matsumoto, K. Yamada and S. Hoshino, "Impact of artificial gummy fingers on fingerprint systems," in Proc. of SPIE Optical Security and Counterfeit Deterrence Techniques IV, pp. 1-15, April, 2002.
A. Anjos and S. Marcel, "Counter-measures to photo attacks in face recognition: A public database and a baseline," in Proc. of IEEE Int. Joint Conf. on Biometrics, pp. 1-7, 2011.
G. Pan, Z. Wu and L. Sun, "Liveness detection for face recognition," Recent Advances in Face Recognition, InTech, Ch. 9, pp. 235-252, 2008.
K. A. Nixon, A. Aimale and R. K. Rowe, "Spoof detection schemes," in Handbook of Biometrics, 1st ed., Springer, US, Ch. 10, pp. 403-423, 2008.
J. Li, Y. Wang, Y. Tan and A. K. Jain, "Live face detection based on the analysis of Fourier spectra," in Proc. of SPIE on Biometric Technology for Human Identification, pp. 296-303, 2004.
X. Tan, Y. Li, J. Liu and L. Jiang, "Face liveness detection from a single image with sparse low rank bilinear discriminative model," in Proc. of European Conference on Computer Vision (ECCV), Springer, pp. 504-517, 2010.
B. Peixoto, C. Michelassi and A. Rocha, "Face liveness detection under bad Illumination conditions," in Proc. of IEEE International Conference on Image Processing (ICIP), pp. 3557-3560, 2011.
W. R. Schwartz, A. Rocha and H. Pedrini, "Face spoofing detection through partial least squares and low-level descriptors," in Proc. of IEEE International Joint Conference on Biometrics (IJCB), pp. 1-8, 2011.
Z. Zhang et al., "A face antispoofing database with diverse attacks," in Proc. of IEEE Int. Conf. on Biometrics (ICB), pp. 26-31, 2012.
J. Galbally and S. Marcel, "Face anti-spoofing based on general image quality assessment," in Proc. of IEEE 22nd International Conf. on Pattern Recognition (ICPR), pp. 1173-1178, 2014.
D. Wen, H. Han and A. K. Jain, "Face spoof detection with image distortion analysis," IEEE T INF FOREN SEC, vol. 10, no. 4, pp. 746-761, 2015.
T. Pereira, J. Komulainen, A. Anjos, J. M. D. Martino, A. Hadid, M. Pietikainen and S. Marcel, "Face liveness detection using dynamic texture," EURASIP Journal on Image and Video Processing, vol. 2014, no. 2, pp. 1-15, 2014.
Z. Boulkenafet, J. Komulainen and A. Hadid, "Face anti-spoofing based on color texture analysis," in Proc. of IEEE Int. Conf. on Image Processing, pp. 2636-2640, 2015.
Z. Boulkenafet, J. Komulainen and A. Hadid, "Face spoofing detection using color texture analysis," IEEE T INF FOREN SEC, vol. 11, no. 8, pp. 1818-1830, 2016.
J. Yang, Z. Lei and S. Z. Li, "Learn CNN for face anti-spoofing," 2014.
Z. Xu, S. Li and W. Deng, "Learning temporal features using LSTM-CNN architecture for face anti-spoofing," in Proc. of IEEE 3rd Int. Asian Conf. on Pattern Recognition (ACPR), pp. 141-145, 2015.
G. Pan, L. Sun, Z. Wu and Y. Wang, "Monocular camera-based face liveness detection by combining eyeblink and scene context," Telecommunication Systems, vol. 47, pp. 215-225, 2011.
S. Tirunagari et al., "Detection of face spoofing using visual dynamics," IEEE T INF FOREN SEC, vol. 10, no. 4, pp. 762-777, 2015.
A. d S. Pinto, H. Pedrini, W. R. Schwartz and A. Rocha, "Video-based face spoofing detection through visual rhythm analysis," in Proc. of IEEE 25th Conf. on Graphics, Patterns and Images, pp. 221-228, 2012.
A. Anjos et al., "Face anti-spoofing: visual approach," Handbook of Biometric Anti-Spoofing, 1st ed., Springer, London, 2014, Ch. 4, pp. 65-83.
G. Pan, L. Sun, Z. Wu and S. Lao, "Eyeblink-based anti-spoofing in face recognition from a generic webcamera," in Proc. of IEEE 11th Int. Conf. Computer Vision (ICCV), pp. 1-8, 2007.
J. Komulainen, A. Hadid and M. Pietikainen, "Context-based face anti-spoofing," in Proc. of IEEE 6th Int. Conf. on Biometrics: Theory, Applications and Systems (BTAS), pp. 1-8, 2013.
M. I. Faraj and J. Bigun, "Audio-visual authentication using lip-motion from orientation maps," Pattern Recognition Letters, vol. 28, pp. 1368-1382, 2007.
Z. Zhang, D. Yi, Z. Lei and S. Z. Li, "Face liveness detection by learing multiplectral reflectance distributions," in Proc. of IEEE Int. Conf. on Automatic Face and Gesture Recognition (AFGR), pp. 436-441, 2011.
I. Pavlidis and P. Symosek, "The imaging issue in an automatic face/disguise detection system," in Proc. of IEEE Int. Workshop on Computer Vision Beyond the Visible Spectrum: Methods and Applications, pp. 15-24, 2000.
K. Patel, H. Han, A. K. Jain and G. Ott, "Live face video vs. spoof face video: Use of moire patterns to detect replay video attacks," in Proc. of IEEE Int. Conf. on Biometrics (ICB), pp. 98-105, 2015.
P. Vuilleumier, J. L. Armony, J. Driver and R. J. Dolan, "Distinct spatial frequency sensitivities for processing faces and emotional expressions," Nature Neuroscience, vol. 6, no. 6, pp. 624-631, 2003.
R. Basri and D. W. Jacobs, "Lambertian reflectance and linear subspaces," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 25, no. 2, pp. 218-233, 2003.
H. J. Nussbaumer, "The fast Fourier transform," Fast Fourier Transform and Convolution Algorithms, 2nd ed., Springer-Verlag, Berlin-Heidelberg, Ch. 4, pp. 80-111, 1982.
D. G. Lowe, "Distinctive image features from scale-invariant key points," Int. Journal of Computer Vision, vol. 60, no. 2, pp. 91-110, 2004. .
Z. Akhtar and G. L. Foresti, "Face spoof attack recognition using discriminative image patches," Journal of Electrical and Computer Engineering, vol. 2016, pp. 1-14, 2016.
J. Yang, Z. Lei, S. Liao and S. Z. Li, "Face liveness detection with component dependent descriptor," in Proc. of IEEE Int. Conf. on Biometrics (ICB), pp. 1-6, 2013.
C. C. Chang and C. J. Lin, "LIBSVM: a library for support vector machines," ACM Trans. on Intelligent Systems and Technology, vol. 2, no. 27, pp. 1-27, 2011.
S. Bharadwaj, T. I. Dhamecha, M. Vatsa and R. Singh, "Computationally efficient face spoofing detection with motion magnification," in Computer Vision and Pattern Recognition Workshops, pp. 105-110, 2013.
D. Menotti et al., "Deep Representations for iris, face, and fingerprint spoofing detection," in IEEE T INF FOREN SEC, vol. 10, no. 4, pp. 864-879, April 2015.
N. Erdogmus and S. Marcel, "Spoofing in 2D face recognition with 3D masks and anti-spoofing with kinect," in Proc. of IEEE 6th Int. Conf. on Biometrics:Theory, Application and Systems (BTAS), pp. 1-6, 2013.
A. Pinto, W. R. Schwartz, H. Pedrini, A. d. R. Rocha, "Using visual rhythms for detecting video-based facial spoof attacks," IEEE Trans. on Information Forensics and Security, vol.10, no.5, pp.1025-1038, May 2015.
A. Pinto, H. Pedrini, W. R. Schwartz and A. Rocha, "Face spoofing detection through visual codebooks of spectral temporal cubes," IEEE Trans on Image Processing, vol. 24, no. 12, pp. 4726-4740, Dec. 2015.
I. Manjani et al., "Detecting silicone mask-based presentation attack via deep dictionary learning," IEEE T INF FOREN SEC, vol. 12, no. 7, pp. 1713-1723, July 2017.
D. Gragnaniello, G. Poggi, C. Sansone and L. Verdoliva, "An investigation of local descriptors for biometric spoofing detection," IEEE T INF FOREN SEC, vol. 10, no. 4, pp. 849-863, April 2015.
F. Liu et al., "Local structure based multi-phase collaborative representation for face recognition with single sample per person," Information Sciences, vol. 346-347, pp. 198-215, June 2016.
Q. Ye et al., "L1-norm distance minimization-based fast robust twin support vector k-plane clustering," IEEE Trans on Neural Netw. and Learning Syst., vol. PP, no. 99, pp. 1-10, 2017.
H. Yan et al., "L1-norm GEPSVM classifier based on an effective iterative algorithm for classification," Neural Processing Letters, vol. 48, no. 1, pp. 273-298, 2017.
Q. Ye et al., "Lp- and Ls-norm distance based robust linear discriminant analysis," Neural Networks, vol. 105, pp. 393-404, 2018.
F. Liu, J. Tang, and Z. Tang, "An eye states detection method by using WLBP," in Proc. of 7th IEEE Int. Conf. on Semantic Computing, CA, pp. 198-201, 2013.
F. Liu, Z.Tang, and J. Tang, "WLBP: weber local binary pattern for local image description," Neurocomputing, vol. 120, pp. 325-335, November 2013.
X. Shu et al., "Image classification with tailored fine-grained dictionaries," IEEE Trans. on Circuits and Systems for Video Technology, vol. 28, no. 2, pp. 454-467, Feb. 2018.
Z. Li and J. Tang, "Unsupervised feature selection via nonnegative spectral analysis and redundancy control," IEEE Trans Image Process., vol. 24, no. 12, pp. 5343-5355, Dec. 2015.
Z. Li, J. Tang and X. He, "Robust structured nonnegative matrix factorization for image representation," IEEE Trans on Neural Netw. and Learning Syst., vol. 29, no. 5, pp. 1947-1960, May 2018.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.