Attacks and defenses in user authentication systems: A survey

X Wang, Z Yan, R Zhang, P Zhang - Journal of Network and Computer …, 2021 - Elsevier
User authentication systems (in short authentication systems) have wide utilization in our
daily life. Unfortunately, existing authentication systems are prone to various attacks while …

Privacy–enhancing face biometrics: A comprehensive survey

B Meden, P Rot, P Terhörst, N Damer… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Biometric recognition technology has made significant advances over the last decade and is
now used across a number of services and applications. However, this widespread …

Person recognition system based on a combination of body images from visible light and thermal cameras

DT Nguyen, HG Hong, KW Kim, KR Park - Sensors, 2017 - mdpi.com
The human body contains identity information that can be used for the person recognition
(verification/recognition) problem. In this paper, we propose a person recognition method …

Biometric face presentation attack detection with multi-channel convolutional neural network

A George, Z Mostaani, D Geissenbuhler… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Face recognition is a mainstream biometric authentication method. However, the
vulnerability to presentation attacks (aka spoofing) limits its usability in unsupervised …

Biometric antispoofing methods: A survey in face recognition

J Galbally, S Marcel, J Fierrez - Ieee Access, 2014 - ieeexplore.ieee.org
In recent decades, we have witnessed the evolution of biometric technology from the first
pioneering works in face and voice recognition to the current state of development wherein a …

Cross modal focal loss for rgbd face anti-spoofing

A George, S Marcel - … of the IEEE/CVF conference on …, 2021 - openaccess.thecvf.com
Automatic methods for detecting presentation attacks are essential to ensure the reliable use
of facial recognition technology. Most of the methods available in the literature for …

Learning one class representations for face presentation attack detection using multi-channel convolutional neural networks

A George, S Marcel - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
Face recognition has evolved as a widely used biometric modality. However, its vulnerability
against presentation attacks poses a significant security threat. Though presentation attack …

On the effectiveness of vision transformers for zero-shot face anti-spoofing

A George, S Marcel - 2021 IEEE International Joint Conference …, 2021 - ieeexplore.ieee.org
The vulnerability of face recognition systems to presentation attacks has limited their
application in security-critical scenarios. Automatic methods of detecting such malicious …

A comprehensive database for benchmarking imaging systems

K Panetta, Q Wan, S Agaian, S Rajeev… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Cross-modality face recognition is an emerging topic due to the wide-spread usage of
different sensors in day-to-day life applications. The development of face recognition …

Morgan: Recognition vulnerability and attack detectability of face morphing attacks created by generative adversarial network

N Damer, AM Saladie, A Braun… - 2018 IEEE 9th …, 2018 - ieeexplore.ieee.org
Face morphing attacks aim at creating face images that are verifiable to be the face of
multiple identities, which can lead to building faulty identity links in operations like border …