Abstract. User authentication is an important step to protect informa-tion and in this field face biometrics is advantageous. Face biometrics is natural, easy to use and less human-invasive. Unfortunately, recent work has revealed that face biometrics is vulnerable to spoofing attacks using low-tech cheap equipments. This article presents a countermeasure against such attacks based on the LBP −TOP operator combining both space and time information into a single multiresolution texture descrip-tor. Experiments carried out with the REPLAY ATTACK database show a Half Total Error Rate (HTER) improvement from 15.16 % to 7.60%.
User authentication is an important step to protect information, and in this context, face biometric...
Face authentication has been shown to be vulnerable against three main kinds of attacks: print, repl...
In recent decades, the evolution of biometric technology from the first revolutionary works in faces...
Abstract. User authentication is an important step to protect informa-tion and in this field face bi...
Abstract. User authentication is an important step to protect informa-tion and in this field face bi...
User authentication is an important step to protect information and in this eld face biometrics is a...
User authentication is an important step to protect information and in this field face biometrics is...
Abstract—Spoofing attacks are one of the security traits that biometric recognition systems are prov...
Abstract: Spoofing attacks are one of the security traits that biometric recognition systems are pro...
User authentication is an important step to protect in-formation and in this field face biometrics i...
User authentication is an important step to protect information and in this field face biometrics is...
Spoofing attacks are one of the security traits that biometric recognition systems are proven to be ...
User authentication is an important step to protect information, and in this context, face biometric...
User authentication is an important step to protect in- formation and in this field face biometrics ...
In recent decades, we have witnessed the evolution of biometric technology from the first pioneering...
User authentication is an important step to protect information, and in this context, face biometric...
Face authentication has been shown to be vulnerable against three main kinds of attacks: print, repl...
In recent decades, the evolution of biometric technology from the first revolutionary works in faces...
Abstract. User authentication is an important step to protect informa-tion and in this field face bi...
Abstract. User authentication is an important step to protect informa-tion and in this field face bi...
User authentication is an important step to protect information and in this eld face biometrics is a...
User authentication is an important step to protect information and in this field face biometrics is...
Abstract—Spoofing attacks are one of the security traits that biometric recognition systems are prov...
Abstract: Spoofing attacks are one of the security traits that biometric recognition systems are pro...
User authentication is an important step to protect in-formation and in this field face biometrics i...
User authentication is an important step to protect information and in this field face biometrics is...
Spoofing attacks are one of the security traits that biometric recognition systems are proven to be ...
User authentication is an important step to protect information, and in this context, face biometric...
User authentication is an important step to protect in- formation and in this field face biometrics ...
In recent decades, we have witnessed the evolution of biometric technology from the first pioneering...
User authentication is an important step to protect information, and in this context, face biometric...
Face authentication has been shown to be vulnerable against three main kinds of attacks: print, repl...
In recent decades, the evolution of biometric technology from the first revolutionary works in faces...