User authentication is an important step to protect information and in this field face biometrics is advantageous. Face biometrics is natural, easy to use and less human-invasive. Unfortunately, recent work has revealed that face biometrics is vulnerable to spoofing attacks using low-tech cheap equipments. This article presents a countermeasure against such attacks based on the LBP-TOP operator combining both space and time information into a single multiresolution texture descriptor. Experiments carried out with the REPLAY ATTACK database show a Half Total Error Rate (HTER) improvement from 15.16% to 7.60%. © 2013 Springer-Verlag.7728 LNCSPART 1121132Ahonen, T., Hadid, A., Pietikainen, M., Face Description with Local Binary Patterns: Appli...
Face authentication has been shown to be vulnerable against three main kinds of attacks: print, repl...
Face authentication has been shown to be vulnerable against three main kinds of attacks: print, repl...
Face authentication has been shown to be vulnerable against three main kinds of attacks: print, repl...
User authentication is an important step to protect information and in this eld face biometrics is a...
User authentication is an important step to protect information and in this field face biometrics is...
Abstract. User authentication is an important step to protect informa-tion and in this field face bi...
Abstract. User authentication is an important step to protect informa-tion and in this field face bi...
Abstract. User authentication is an important step to protect informa-tion and in this field face bi...
User authentication is an important step to protect information, and in this context, face biometric...
Spoofing attacks are one of the security traits that biometric recognition systems are proven to be ...
Abstract—Spoofing attacks are one of the security traits that biometric recognition systems are prov...
Abstract: Spoofing attacks are one of the security traits that biometric recognition systems are pro...
User authentication is an important step to protect information, and in this context, face biometric...
User authentication is an important step to protect in- formation and in this field face biometrics ...
Face authentication has been shown to be vulnerable against three main kinds of attacks: print, repl...
Face authentication has been shown to be vulnerable against three main kinds of attacks: print, repl...
Face authentication has been shown to be vulnerable against three main kinds of attacks: print, repl...
Face authentication has been shown to be vulnerable against three main kinds of attacks: print, repl...
User authentication is an important step to protect information and in this eld face biometrics is a...
User authentication is an important step to protect information and in this field face biometrics is...
Abstract. User authentication is an important step to protect informa-tion and in this field face bi...
Abstract. User authentication is an important step to protect informa-tion and in this field face bi...
Abstract. User authentication is an important step to protect informa-tion and in this field face bi...
User authentication is an important step to protect information, and in this context, face biometric...
Spoofing attacks are one of the security traits that biometric recognition systems are proven to be ...
Abstract—Spoofing attacks are one of the security traits that biometric recognition systems are prov...
Abstract: Spoofing attacks are one of the security traits that biometric recognition systems are pro...
User authentication is an important step to protect information, and in this context, face biometric...
User authentication is an important step to protect in- formation and in this field face biometrics ...
Face authentication has been shown to be vulnerable against three main kinds of attacks: print, repl...
Face authentication has been shown to be vulnerable against three main kinds of attacks: print, repl...
Face authentication has been shown to be vulnerable against three main kinds of attacks: print, repl...
Face authentication has been shown to be vulnerable against three main kinds of attacks: print, repl...