Results 21 to 30 of about 5,266 (270)

Face liveness detection using dynamic texture [PDF]

open access: yesEURASIP Journal on Image and Video Processing, 2014
Abstract User authentication is an important step to protect information, and in this context, face biometrics is potentially advantageous. Face biometrics is natural, intuitive, easy to use, and less human-invasive. Unfortunately, recent work has revealed that face biometrics is vulnerable to spoofing attacks using cheap low-tech equipment ...
Tiago de Freitas Pereira   +6 more
openaire   +1 more source

Directional Sensitivity of Gaze-Collinearity Features in Liveness Detection [PDF]

open access: yes, 2013
To increase the trust in using face recognition systems, these need to be capable of differentiating between face images captured from a real person and those captured from photos or similar artifacts presented at the sensor.
Ali, Asad, Deravi, Farzin, Hoque, Sanaul
core   +1 more source

Continuous face authentication scheme for mobile devices with tracking and liveness detection [PDF]

open access: yes, 2018
We present a novel scheme for continuous face authentication using mobile device cameras that addresses the issue of spoof attacks and attack windows in state-of-the-art approaches.
Cortes   +14 more
core   +1 more source

Multi-cue fusion face liveness detection based on fine-tuning strategy [PDF]

open access: yesJisuanji gongcheng, 2019
To solve the security problems such as print attacks and video replay attacks that may occur during the authentication process,a multi-cue fusion method for detecting human faces is proposed.The pyramid Lucas-Kanade(LK) optical flow is used to track the ...
HU Fei,WEN Chang,XIE Kai,HE Jianbiao
doaj   +1 more source

BioDiVinE: A Framework for Parallel Analysis of Biological Models [PDF]

open access: yes, 2009
In this paper a novel tool BioDiVinEfor parallel analysis of biological models is presented. The tool allows analysis of biological models specified in terms of a set of chemical reactions. Chemical reactions are transformed into a system of multi-affine
C. Belta   +29 more
core   +2 more sources

The Effectiveness of Depth Data in Liveness Face Authentication Using 3D Sensor Cameras

open access: yesSensors, 2019
Even though biometric technology increases the security of systems that use it, they are prone to spoof attacks where attempts of fraudulent biometrics are used.
Ghazel Albakri, Sharifa Alghowinem
doaj   +1 more source

Review of Presentation Attack Detection in Face Recognition System

open access: yesJisuanji kexue yu tansuo, 2021
As the rapid development of face recognition technologies, face presentation attack detection (face liveness detection) techniques are facing new requirements, including instantaneity of?detection, generalization in complicated environments, robustness ...
MA Yukun, XU Yaowen, ZHAO Xin, XU Tao, WANG Zerui
doaj   +1 more source

Face liveness detection under bad illumination conditions [PDF]

open access: yes2011 18th IEEE International Conference on Image Processing, 2011
Spoofing face recognition systems with photos or videos of someone else is not difficult. Sometimes, all one needs is to display a picture on a laptop monitor or a printed photograph to the biometric system. In order to detect this kind of spoofs, in this paper we present a solution that works either with printed or LCD displayed photographs, even ...
Bruno Peixoto   +2 more
openaire   +1 more source

Gaze Stability for Liveness Detection [PDF]

open access: yes, 2016
Spoofing attacks on biometric systems are one of the major impediments to their use for secure unattended applications. This paper explores features for face liveness detection based on tracking the gaze of the user.
A Jain   +15 more
core   +1 more source

Efficient Emptiness Check for Timed B\"uchi Automata (Extended version) [PDF]

open access: yes, 2010
The B\"uchi non-emptiness problem for timed automata refers to deciding if a given automaton has an infinite non-Zeno run satisfying the B\"uchi accepting condition. The standard solution to this problem involves adding an auxiliary clock to take care of
B Berthomieu   +25 more
core   +6 more sources

Home - About - Disclaimer - Privacy