1 |
K. A. Nixon, A. Aimale and R. K. Rowe, "Spoof detection schemes," in Handbook of Biometrics, 1st ed., Springer, US, Ch. 10, pp. 403-423, 2008.
|
2 |
J. Li, Y. Wang, Y. Tan and A. K. Jain, "Live face detection based on the analysis of Fourier spectra," in Proc. of SPIE on Biometric Technology for Human Identification, pp. 296-303, 2004.
|
3 |
X. Tan, Y. Li, J. Liu and L. Jiang, "Face liveness detection from a single image with sparse low rank bilinear discriminative model," in Proc. of European Conference on Computer Vision (ECCV), Springer, pp. 504-517, 2010.
|
4 |
B. Peixoto, C. Michelassi and A. Rocha, "Face liveness detection under bad Illumination conditions," in Proc. of IEEE International Conference on Image Processing (ICIP), pp. 3557-3560, 2011.
|
5 |
W. R. Schwartz, A. Rocha and H. Pedrini, "Face spoofing detection through partial least squares and low-level descriptors," in Proc. of IEEE International Joint Conference on Biometrics (IJCB), pp. 1-8, 2011.
|
6 |
Z. Zhang et al., "A face antispoofing database with diverse attacks," in Proc. of IEEE Int. Conf. on Biometrics (ICB), pp. 26-31, 2012.
|
7 |
J. Galbally and S. Marcel, "Face anti-spoofing based on general image quality assessment," in Proc. of IEEE 22nd International Conf. on Pattern Recognition (ICPR), pp. 1173-1178, 2014.
|
8 |
D. Wen, H. Han and A. K. Jain, "Face spoof detection with image distortion analysis," IEEE T INF FOREN SEC, vol. 10, no. 4, pp. 746-761, 2015.
DOI
|
9 |
T. Pereira, J. Komulainen, A. Anjos, J. M. D. Martino, A. Hadid, M. Pietikainen and S. Marcel, "Face liveness detection using dynamic texture," EURASIP Journal on Image and Video Processing, vol. 2014, no. 2, pp. 1-15, 2014.
DOI
|
10 |
Z. Xu, S. Li and W. Deng, "Learning temporal features using LSTM-CNN architecture for face anti-spoofing," in Proc. of IEEE 3rd Int. Asian Conf. on Pattern Recognition (ACPR), pp. 141-145, 2015.
|
11 |
G. Pan, L. Sun, Z. Wu and Y. Wang, "Monocular camera-based face liveness detection by combining eyeblink and scene context," Telecommunication Systems, vol. 47, pp. 215-225, 2011.
DOI
|
12 |
S. Tirunagari et al., "Detection of face spoofing using visual dynamics," IEEE T INF FOREN SEC, vol. 10, no. 4, pp. 762-777, 2015.
DOI
|
13 |
A. d S. Pinto, H. Pedrini, W. R. Schwartz and A. Rocha, "Video-based face spoofing detection through visual rhythm analysis," in Proc. of IEEE 25th Conf. on Graphics, Patterns and Images, pp. 221-228, 2012.
|
14 |
A. Anjos et al., "Face anti-spoofing: visual approach," Handbook of Biometric Anti-Spoofing, 1st ed., Springer, London, 2014, Ch. 4, pp. 65-83.
|
15 |
G. Pan, L. Sun, Z. Wu and S. Lao, "Eyeblink-based anti-spoofing in face recognition from a generic webcamera," in Proc. of IEEE 11th Int. Conf. Computer Vision (ICCV), pp. 1-8, 2007.
|
16 |
J. Komulainen, A. Hadid and M. Pietikäinen, "Context-based face anti-spoofing," in Proc. of IEEE 6th Int. Conf. on Biometrics: Theory, Applications and Systems (BTAS), pp. 1-8, 2013.
|
17 |
M. I. Faraj and J. Bigun, "Audio-visual authentication using lip-motion from orientation maps," Pattern Recognition Letters, vol. 28, pp. 1368-1382, 2007.
DOI
|
18 |
J. Yang, Z. Lei and S. Z. Li, "Learn CNN for face anti-spoofing," 2014.
|
19 |
Z. Boulkenafet, J. Komulainen and A. Hadid, "Face anti-spoofing based on color texture analysis," in Proc. of IEEE Int. Conf. on Image Processing, pp. 2636-2640, 2015.
|
20 |
Z. Boulkenafet, J. Komulainen and A. Hadid, "Face spoofing detection using color texture analysis," IEEE T INF FOREN SEC, vol. 11, no. 8, pp. 1818-1830, 2016.
DOI
|
21 |
P. Vuilleumier, J. L. Armony, J. Driver and R. J. Dolan, "Distinct spatial frequency sensitivities for processing faces and emotional expressions," Nature Neuroscience, vol. 6, no. 6, pp. 624-631, 2003.
DOI
|
22 |
Z. Zhang, D. Yi, Z. Lei and S. Z. Li, "Face liveness detection by learing multiplectral reflectance distributions," in Proc. of IEEE Int. Conf. on Automatic Face and Gesture Recognition (AFGR), pp. 436-441, 2011.
|
23 |
I. Pavlidis and P. Symosek, "The imaging issue in an automatic face/disguise detection system," in Proc. of IEEE Int. Workshop on Computer Vision Beyond the Visible Spectrum: Methods and Applications, pp. 15-24, 2000.
|
24 |
K. Patel, H. Han, A. K. Jain and G. Ott, "Live face video vs. spoof face video: Use of moiré patterns to detect replay video attacks," in Proc. of IEEE Int. Conf. on Biometrics (ICB), pp. 98-105, 2015.
|
25 |
R. Basri and D. W. Jacobs, "Lambertian reflectance and linear subspaces," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 25, no. 2, pp. 218-233, 2003.
DOI
|
26 |
J. Yang, Z. Lei, S. Liao and S. Z. Li, "Face liveness detection with component dependent descriptor," in Proc. of IEEE Int. Conf. on Biometrics (ICB), pp. 1-6, 2013.
|
27 |
H. J. Nussbaumer, "The fast Fourier transform," Fast Fourier Transform and Convolution Algorithms, 2nd ed., Springer-Verlag, Berlin-Heidelberg, Ch. 4, pp. 80-111, 1982.
|
28 |
D. G. Lowe, "Distinctive image features from scale-invariant key points," Int. Journal of Computer Vision, vol. 60, no. 2, pp. 91-110, 2004. .
DOI
|
29 |
Z. Akhtar and G. L. Foresti, "Face spoof attack recognition using discriminative image patches," Journal of Electrical and Computer Engineering, vol. 2016, pp. 1-14, 2016.
|
30 |
C. C. Chang and C. J. Lin, "LIBSVM: a library for support vector machines," ACM Trans. on Intelligent Systems and Technology, vol. 2, no. 27, pp. 1-27, 2011.
DOI
|
31 |
I. Manjani et al., "Detecting silicone mask-based presentation attack via deep dictionary learning," IEEE T INF FOREN SEC, vol. 12, no. 7, pp. 1713-1723, July 2017.
DOI
|
32 |
S. Bharadwaj, T. I. Dhamecha, M. Vatsa and R. Singh, "Computationally efficient face spoofing detection with motion magnification," in Computer Vision and Pattern Recognition Workshops, pp. 105-110, 2013.
|
33 |
D. Menotti et al., "Deep Representations for iris, face, and fingerprint spoofing detection," in IEEE T INF FOREN SEC, vol. 10, no. 4, pp. 864-879, April 2015.
DOI
|
34 |
N. Erdogmus and S. Marcel, "Spoofing in 2D face recognition with 3D masks and anti-spoofing with kinect," in Proc. of IEEE 6th Int. Conf. on Biometrics:Theory, Application and Systems (BTAS), pp. 1-6, 2013.
|
35 |
A. Pinto, W. R. Schwartz, H. Pedrini, A. d. R. Rocha, "Using visual rhythms for detecting video-based facial spoof attacks," IEEE Trans. on Information Forensics and Security, vol.10, no.5, pp.1025-1038, May 2015.
DOI
|
36 |
A. Pinto, H. Pedrini, W. R. Schwartz and A. Rocha, "Face spoofing detection through visual codebooks of spectral temporal cubes," IEEE Trans on Image Processing, vol. 24, no. 12, pp. 4726-4740, Dec. 2015.
DOI
|
37 |
D. Gragnaniello, G. Poggi, C. Sansone and L. Verdoliva, "An investigation of local descriptors for biometric spoofing detection," IEEE T INF FOREN SEC, vol. 10, no. 4, pp. 849-863, April 2015.
DOI
|
38 |
F. Liu et al., "Local structure based multi-phase collaborative representation for face recognition with single sample per person," Information Sciences, vol. 346-347, pp. 198-215, June 2016.
DOI
|
39 |
Q. Ye et al., "L1-norm distance minimization-based fast robust twin support vector k-plane clustering," IEEE Trans on Neural Netw. and Learning Syst., vol. PP, no. 99, pp. 1-10, 2017.
|
40 |
H. Yan et al., "L1-norm GEPSVM classifier based on an effective iterative algorithm for classification," Neural Processing Letters, vol. 48, no. 1, pp. 273-298, 2017.
|
41 |
I. Chingovska, A. Anjos and S. Marcel, "On the effectiveness of local binary patterns in face anti-spoofing," in Proc. of IEEE Int. Conf. on Biometrics Special Interest Group, pp. 1-7, 2012.
|
42 |
Z. Ali, U. Park, J. Nang, J-S. Park, T. Hong and S. Park, "Periocular recognition using uMLBP and attribute features," KSII Transactions on Internet and Information Systems, vol. 11, no. 12, pp. 6133-6151, 2017.
DOI
|
43 |
A. K. Jain and A. A. Ross, "Introduction to biometrics," Handbook of Biometrics, 1st ed., Springer, US, Ch. 1, pp. 1-22, 2008.
|
44 |
T. F. Pereira, A. Anjos, J. de Martino and S. Marcel, "Can face anti-spoofing countermeasures work in a real world scenario?" in Proc. of IEEE Int. Conf. on Biometrics, pp. 1-8, 2013.
|
45 |
M. D. Nguyen and Q. M. Bui, "Your face is not your password: Face authentication bypassing Lenovo - Asus - Toshiba," in Proc. of Black Hat conference, pp. 1-16, 2009.
|
46 |
J. Maatta, A. Hadid and M. Pietikainen, "Face spoofing detection from single images using micro-texture analysis," in Proc. of IEEE Int. Joint Conf. on Biometrics, pp. 1-7, 2011.
|
47 |
V. R-Albacete, P. T-Gonzalez, F. A-Fernandez, "Direct attacks using fake images in iris verification," Biometrics and Identity Management, vol. 5372, pp. 181-190, 2008.
|
48 |
T. Matsumoto, H. Matsumoto, K. Yamada and S. Hoshino, "Impact of artificial gummy fingers on fingerprint systems," in Proc. of SPIE Optical Security and Counterfeit Deterrence Techniques IV, pp. 1-15, April, 2002.
|
49 |
A. Anjos and S. Marcel, "Counter-measures to photo attacks in face recognition: A public database and a baseline," in Proc. of IEEE Int. Joint Conf. on Biometrics, pp. 1-7, 2011.
|
50 |
G. Pan, Z. Wu and L. Sun, "Liveness detection for face recognition," Recent Advances in Face Recognition, InTech, Ch. 9, pp. 235-252, 2008.
|
51 |
X. Shu et al., "Image classification with tailored fine-grained dictionaries," IEEE Trans. on Circuits and Systems for Video Technology, vol. 28, no. 2, pp. 454-467, Feb. 2018.
DOI
|
52 |
Q. Ye et al., "Lp- and Ls-norm distance based robust linear discriminant analysis," Neural Networks, vol. 105, pp. 393-404, 2018.
DOI
|
53 |
F. Liu, J. Tang, and Z. Tang, "An eye states detection method by using WLBP," in Proc. of 7th IEEE Int. Conf. on Semantic Computing, CA, pp. 198-201, 2013.
|
54 |
F. Liu, Z.Tang, and J. Tang, "WLBP: weber local binary pattern for local image description," Neurocomputing, vol. 120, pp. 325-335, November 2013.
DOI
|
55 |
Z. Li and J. Tang, "Unsupervised feature selection via nonnegative spectral analysis and redundancy control," IEEE Trans Image Process., vol. 24, no. 12, pp. 5343-5355, Dec. 2015.
DOI
|
56 |
Z. Li, J. Tang and X. He, "Robust structured nonnegative matrix factorization for image representation," IEEE Trans on Neural Netw. and Learning Syst., vol. 29, no. 5, pp. 1947-1960, May 2018.
DOI
|