Results 61 to 70 of about 4,892 (195)
a) Schematic of the SSPP waveguide integrated with SRR metamaterial and MEMS actuator arrays with electric field confinement in the gap below the microbridge. b) Cross‐section of the MEMS actuator consists of a buried lead line and a microbridge at different deflection positions. c) The notch band in the microwave transmission characteristic shifts due
Van Minh Nguyen, Yoshiaki Kanamori
wiley +1 more source
Biometrics, One Among the existing security authentication schemes, involves parts of body for identification, hence used in various fields. Due to the level of its simplicity fingerprint recognition remains popular. But the introduction of many technologies has made to lose its uniqueness by just taking a finger print scan, print it on special paper ...
V. Lalitha +3 more
openaire +1 more source
Face Anti-Spoofing with Human Material Perception [PDF]
Face anti-spoofing (FAS) plays a vital role in securing the face recognition systems from presentation attacks. Most existing FAS methods capture various cues (e.g., texture, depth and reflection) to distinguish the live faces from the spoofing faces.
Yu, Z. (Zitong) +4 more
openaire +3 more sources
This work presents an ultrathin terahertz metamaterial absorber that achieves broadband and polarization‐insensitive performance through multimode spoof‐plasmon resonances and tunable indium tin oxide loss engineering. The absorber offers near‐Rozanov‐limit thickness and optical transparency, enabling integration into compact and multifunctional THz ...
Jinlin Mu +8 more
wiley +1 more source
Generative Domain Adaptation for Face Anti-Spoofing
Face anti-spoofing (FAS) approaches based on unsupervised domain adaption (UDA) have drawn growing attention due to promising performances for target scenarios. Most existing UDA FAS methods typically fit the trained models to the target domain via aligning the distribution of semantic high-level features. However, insufficient supervision of unlabeled
Qianyu Zhou 0001 +6 more
openaire +2 more sources
Learning Meta Pattern for Face Anti-Spoofing
Accepted by IEEE Transactions on Information Forensics and Security (https://ieeexplore.ieee.org.remotexs.ntu.edu.sg/document/9732458) Source code available in https://github.com/RizhaoCai ...
Rizhao Cai +5 more
openaire +3 more sources
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley +1 more source
Texture analysis using local ternary pattern for face anti-spoofing [PDF]
This paper proposes a new face anti-spoofing approach based on analysis of texture characteristics. Photo images are used for spoofing the face recognition and verification system.
Hanafi, Marsyita +4 more
core
Face Spoofing Detection by Fusing Binocular Depth and Spatial Pyramid Coding Micro-Texture Features
Robust features are of vital importance to face spoofing detection, because various situations make feature space extremely complicated to partition. Thus in this paper, two novel and robust features for anti-spoofing are proposed.
Lin, Tianwei, Song, Xiao, Zhao, Xu
core +1 more source
A Review on Face Anti-Spoofing
The biometric system is a security technology that uses information based on a living person's characteristics to verify or recognize the identity, such as facial recognition. Face recognition has numerous applications in the real world, such as access control and surveillance. But face recognition has a security issue of spoofing. A face anti-spoofing,
Perdana, Rizky Naufal +2 more
openaire +3 more sources

