Results 41 to 50 of about 7,700 (189)

Face Spoofing Detection by Fusing Binocular Depth and Spatial Pyramid Coding Micro-Texture Features

open access: yes, 2017
Robust features are of vital importance to face spoofing detection, because various situations make feature space extremely complicated to partition. Thus in this paper, two novel and robust features for anti-spoofing are proposed.
Lin, Tianwei, Song, Xiao, Zhao, Xu
core   +1 more source

Surveillance Face Anti-Spoofing

open access: yesIEEE Transactions on Information Forensics and Security
Face Anti-spoofing (FAS) is essential to secure face recognition systems from various physical attacks. However, recent research generally focuses on short-distance applications (i.e., phone unlocking) while lacking consideration of long-distance scenes (i.e., surveillance security checks). In order to promote relevant research and fill this gap in the
Hao Fang   +7 more
openaire   +3 more sources

How far did we get in face spoofing detection?

open access: yes, 2018
The growing use of control access systems based on face recognition shed light over the need for even more accurate systems to detect face spoofing attacks.
Oliveira, Luciano   +3 more
core   +2 more sources

Deep convolutional neural networks for face and iris presentation attack detection: Survey and case study

open access: yes, 2020
Biometric presentation attack detection is gaining increasing attention. Users of mobile devices find it more convenient to unlock their smart applications with finger, face or iris recognition instead of passwords.
El-Din, Yomna Safaa   +2 more
core   +1 more source

A Real-Time Face Detection Method Based on Blink Detection

open access: yesIEEE Access, 2023
Face anti-spoofing refers to the computer determining whether the face detected is a real face or a forged face. In user authentication scenarios, photo fraud attacks are easy to occur, where an illegal user logs into the system using a legitimate user ...
Hui Qi   +5 more
doaj   +1 more source

Audio-replay attack detection countermeasures

open access: yes, 2017
This paper presents the Speech Technology Center (STC) replay attack detection systems proposed for Automatic Speaker Verification Spoofing and Countermeasures Challenge 2017.
Kozlov, Alexander   +5 more
core   +1 more source

Deteksi Serangan Spoofing Wajah Menggunakan Convolutional Neural Network

open access: yesJuTISI (Jurnal Teknik Informatika dan Sistem Informasi), 2021
Facial recognition-based biometric authentication is increasingly frequently employed. However, a facial recognition system should not only recognize an individual's face, but it should also be capable of detecting spoofing attempts using printed faces ...
Raden Budiarto Hadiprakoso   +1 more
doaj   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, Volume 43, Issue 3, Page 2254-2341, May 2026.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Learning to Generate Posters of Scientific Papers

open access: yes, 2016
Researchers often summarize their work in the form of posters. Posters provide a coherent and efficient way to convey core ideas from scientific papers.
Fu, Yanwei   +4 more
core   +1 more source

On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection

open access: yesExpert Systems, Volume 43, Issue 5, May 2026.
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy