Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2018 at "Wireless Personal Communications"
DOI: 10.1007/s11277-018-5661-1
Abstract: Face recognition is a most widely used and rapidly growing biometric technology. Lot of research has been done in this field, due to its significant applications in various sectors and their influence in our daily…
read more here.
Keywords:
liveness indicators;
multiple liveness;
liveness detection;
liveness ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "Neurocomputing"
DOI: 10.1016/j.neucom.2019.11.117
Abstract: Abstract Face recognition as an identity authentication has been widely used in commodity mobile systems. However due to increasing attacks against face recognition algorithms, mobile systems users begin to concern about the security of face…
read more here.
Keywords:
attack;
liveness detection;
recognition;
face ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2901235
Abstract: Due to the lack of pre-judgment of fingerprints, fingerprint authentication systems are frequently vulnerable to artificial replicas. Anonymous people can impersonate authorized users to complete various authentication operations, thereby disrupting the order of life and…
read more here.
Keywords:
image;
image scale;
liveness detection;
scale ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2936890
Abstract: Fingerprints are known to be easily synthesized to trick identification systems. In this paper, we propose a new method that incorporates template fingerprints stored for identification in the liveness detection system. The fingerprint identification platform…
read more here.
Keywords:
probe;
liveness detection;
convolutional neural;
liveness ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2022.3230992
Abstract: Voice user interface (VUI) brings high efficiency and convenience for the applications of Internet of Things (IoT), meanwhile, it can also cause increasingly serious security issues. The word-level voice liveness detection is proved to be…
read more here.
Keywords:
resnet;
voice;
self attentional;
detection ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2022.3231381
Abstract: Wearable devices-based biometrics has become mainstream in the biometric domain, especially in mobile computing, due to its convenience, flexibility, and potentially high user acceptance. Among various modalities, wearable devices-based gait recognition has been recognized as…
read more here.
Keywords:
authentication;
wearable devices;
pistis;
gait ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Journal of Electronic Imaging"
DOI: 10.1117/1.jei.28.1.013003
Abstract: Abstract. Face recognition based-access systems have been used widely in security systems as the recognition accuracy can be quite high. However, these systems suffer from low robustness to spoofing attacks. To achieve a reliable security…
read more here.
Keywords:
face;
face liveness;
light field;
liveness detection ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "Symmetry"
DOI: 10.3390/sym11030360
Abstract: Face liveness detection is important for ensuring security. However, because faces are shown in photographs or on a display, it is difficult to detect the real face using the features of the face shape. In…
read more here.
Keywords:
liveness detection;
thermal face;
face cnn;
face ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2017 at "Symmetry"
DOI: 10.3390/sym9120305
Abstract: Face recognition systems have been widely adopted for user authentication in security systems due to their simplicity and effectiveness. However, spoofing attacks, including printed photos, displayed photos, and replayed video attacks, are critical challenges to…
read more here.
Keywords:
liveness detection;
face images;
skin blood;
face ... See more keywords