Results 81 to 90 of about 10,579 (187)
Face Liveness Detection Using Defocus
In order to develop security systems for identity authentication, face recognition (FR) technology has been applied. One of the main problems of applying FR technology is that the systems are especially vulnerable to attacks with spoofing faces (e.g., 2D
Sooyeon Kim, Yuseok Ban, Sangyoun Lee
doaj +1 more source
Access Control in Healthcare IoT: A Comprehensive Survey
This survey analyses access control mechanisms in Healthcare IoT, reviewing traditional and emerging models, identifying security and privacy challenges, and highlighting open research issues. It provides a comparative perspective to support the design of secure, scalable, and patient‐centric healthcare IoT systems.
Aleena Nazir +3 more
wiley +1 more source
The Case of Fleeting Orders and Flickering Quotes
ABSTRACT The literature controversially discusses the ambiguous motives and driving forces behind quickly cancelled limit orders (fleeting orders), which are characteristic of high‐frequency markets. In particular, manipulative and dysfunctional characteristics are feared. We analyze top‐of‐book fleeting orders—so‐called flickering quotes—and show with
Markus Ulze +2 more
wiley +1 more source
Unidirectional Far‐Field Radiation of Surface Waves by On‐Chip Achromatic Metasurfaces
Converting surface waves to unidirectional far‐field beams is essential for on‐chip photonics, but traditional couplers often suffer from inefficiency and frequency dispersion. This work experimentally demonstrates the concept of on‐chip achromatic metasurfaces, which can efficiently decouple broadband surface waves into unidirectional far‐field beams.
Haodong Li +3 more
wiley +1 more source
A Novel High-Performance Face Anti-Spoofing Detection Method
Accurate face recognition technology is of great significance for face anti-counterfeiting. Due to illumination, posture, angle, and other reasons, the existing face liveness detection technology is difficult to adapt the environmental changes, resulting
Hui Qi, Rui Han, Ying Shi, Xiaobo Qi
doaj +1 more source
Face spoof detection using ensemble classifier
In modern technology, face recognition system has received great attention. Several desktop, web and mobile applications make use of face recognition for security purpose. A major point of concern is the ability of the face recognition system to prevent an authorised person from having access to the application.
openaire +1 more source
Detection of Anti-spoofing Face using Yolo
This paper presents a novel approach for face anti-spoofing detection using the YOLO object detection algorithm. By training a YOLO model on a diverse dataset of real and spoofed facial images, the system effectively identifies and classifies faces as genuine or fake in real-time.
RAJANA VISHNU SAI VARDHAN - +2 more
openaire +1 more source
Enhancing Trust in eAssessment - the TeSLA System Solution
Trust in eAssessment is an important factor for improving the quality of online-education. A comprehensive model for trust based authentication for eAssessment is being developed and tested within the score of the EU H2020 project TeSLA.
Bhattacharjee, Sushil +4 more
core
Face Recognition for Logging in Using Deep Learning for Liveness Detection on Healthcare Kiosks
This study explores the enhancement of healthcare kiosks by integrating facial recognition and liveness detection technologies to address the limitations of healthcare service accessibility for a growing population. Healthcare kiosks increase efficiency,
Catoer Ryando +3 more
doaj +1 more source
Multimodal Face Data Sets—A Survey of Technologies, Applications, and Contents
Introduction. Biometric verification for controlling access to digital devices has become ubiquitous for its ease-of-use but often relies on notoriously data-hungry supervised machine learning.
Kamela Al-Mannai +3 more
doaj +1 more source

