Spoofing and countermeasures for speaker verification: A survey
While biometric authentication has advanced significantly in recent years, evidence shows
the technology can be susceptible to malicious spoofing attacks. The research community …
the technology can be susceptible to malicious spoofing attacks. The research community …
A survey on antispoofing schemes for fingerprint recognition systems
Several issues related to the vulnerability of fingerprint recognition systems to attacks have
been highlighted in the biometrics literature. One such vulnerability involves the use of …
been highlighted in the biometrics literature. One such vulnerability involves the use of …
Biometric antispoofing methods: A survey in face recognition
In recent decades, we have witnessed the evolution of biometric technology from the first
pioneering works in face and voice recognition to the current state of development wherein a …
pioneering works in face and voice recognition to the current state of development wherein a …
Security evaluation of pattern classifiers under attack
Pattern classification systems are commonly used in adversarial applications, like biometric
authentication, network intrusion detection, and spam filtering, in which data can be …
authentication, network intrusion detection, and spam filtering, in which data can be …
LBP − TOP Based Countermeasure against Face Spoofing Attacks
User authentication is an important step to protect information and in this field face
biometrics is advantageous. Face biometrics is natural, easy to use and less human …
biometrics is advantageous. Face biometrics is natural, easy to use and less human …
Can face anti-spoofing countermeasures work in a real world scenario?
T de Freitas Pereira, A Anjos… - … on biometrics (ICB), 2013 - ieeexplore.ieee.org
User authentication is an important step to protect information and in this field face
biometrics is advantageous. Face biometrics is natural, easy to use and less human …
biometrics is advantageous. Face biometrics is natural, easy to use and less human …
Face liveness detection using dynamic texture
User authentication is an important step to protect information, and in this context, face
biometrics is potentially advantageous. Face biometrics is natural, intuitive, easy to use, and …
biometrics is potentially advantageous. Face biometrics is natural, intuitive, easy to use, and …
Presentation attack detection for iris recognition: An assessment of the state-of-the-art
Iris recognition is increasingly used in large-scale applications. As a result, presentation
attack detection for iris recognition takes on fundamental importance. This survey covers the …
attack detection for iris recognition takes on fundamental importance. This survey covers the …
Cybersecurity of autonomous vehicles: A systematic literature review of adversarial attacks and defense models
Autonomous driving (AD) has developed tremendously in parallel with the ongoing
development and improvement of deep learning (DL) technology. However, the uptake of …
development and improvement of deep learning (DL) technology. However, the uptake of …
Security evaluation of biometric authentication systems under real spoofing attacks
Multimodal biometric systems are commonly believed to be more robust to spoofing attacks
than unimodal systems, as they combine information coming from different biometric traits …
than unimodal systems, as they combine information coming from different biometric traits …