Spoofing and countermeasures for speaker verification: A survey

Z Wu, N Evans, T Kinnunen, J Yamagishi, F Alegre… - speech …, 2015 - Elsevier
While biometric authentication has advanced significantly in recent years, evidence shows
the technology can be susceptible to malicious spoofing attacks. The research community …

A survey on antispoofing schemes for fingerprint recognition systems

E Marasco, A Ross - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Several issues related to the vulnerability of fingerprint recognition systems to attacks have
been highlighted in the biometrics literature. One such vulnerability involves the use of …

Biometric antispoofing methods: A survey in face recognition

J Galbally, S Marcel, J Fierrez - Ieee Access, 2014 - ieeexplore.ieee.org
In recent decades, we have witnessed the evolution of biometric technology from the first
pioneering works in face and voice recognition to the current state of development wherein a …

Security evaluation of pattern classifiers under attack

B Biggio, G Fumera, F Roli - IEEE transactions on knowledge …, 2013 - ieeexplore.ieee.org
Pattern classification systems are commonly used in adversarial applications, like biometric
authentication, network intrusion detection, and spam filtering, in which data can be …

LBP − TOP Based Countermeasure against Face Spoofing Attacks

T de Freitas Pereira, A Anjos, JM De Martino… - Computer Vision-ACCV …, 2013 - Springer
User authentication is an important step to protect information and in this field face
biometrics is advantageous. Face biometrics is natural, easy to use and less human …

Can face anti-spoofing countermeasures work in a real world scenario?

T de Freitas Pereira, A Anjos… - … on biometrics (ICB), 2013 - ieeexplore.ieee.org
User authentication is an important step to protect information and in this field face
biometrics is advantageous. Face biometrics is natural, easy to use and less human …

Face liveness detection using dynamic texture

T Freitas Pereira, J Komulainen, A Anjos… - EURASIP Journal on …, 2014 - Springer
User authentication is an important step to protect information, and in this context, face
biometrics is potentially advantageous. Face biometrics is natural, intuitive, easy to use, and …

Presentation attack detection for iris recognition: An assessment of the state-of-the-art

A Czajka, KW Bowyer - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Iris recognition is increasingly used in large-scale applications. As a result, presentation
attack detection for iris recognition takes on fundamental importance. This survey covers the …

Cybersecurity of autonomous vehicles: A systematic literature review of adversarial attacks and defense models

M Girdhar, J Hong, J Moore - IEEE Open Journal of Vehicular …, 2023 - ieeexplore.ieee.org
Autonomous driving (AD) has developed tremendously in parallel with the ongoing
development and improvement of deep learning (DL) technology. However, the uptake of …

Security evaluation of biometric authentication systems under real spoofing attacks

B Biggio, Z Akhtar, G Fumera, GL Marcialis, F Roli - IET biometrics, 2012 - IET
Multimodal biometric systems are commonly believed to be more robust to spoofing attacks
than unimodal systems, as they combine information coming from different biometric traits …