The object of the study is spoofing attacks on identification systems based on human face biometrics. The article provides an overview of the main types of spoofing attacks and features of their detection, as well as an overview of existing solutions for detecting attacks, and discusses their advantages and disadvantages. The subject of the research is systems for detecting and counteracting spoofing attacks in face biometric identification systems. The purpose of the work is to create an improved method for detecting and counteracting spoofing attacks based on convolutional neural networks using an image depth map that would provide a HTER of less than 1%. The proposed system allows detecting all available types of spoofing attacks (print...
Many situations require users to log into a computer system. For example to perform private tasks li...
Many situations require users to log into a computer system. For example to perform private tasks li...
Spoofing attacks are one of the security traits that biometric recognition systems are proven to be ...
The biometric system is a security technology that uses information based on a living person's chara...
A spoofing attack is a situation in which one person successfully masquerades as another by falsifyi...
User authentication is an important step to protect information and in this field face biometrics is...
In recent decades, we have witnessed the evolution of biometric technology from the first pioneering...
To detect duplication of identity during authentication of online payment on mobile or personal comp...
In recent decades, the evolution of biometric technology from the first revolutionary works in faces...
The vulnerability of the face recognition system to spoofing attacks has piqued the biometric commun...
With biometrics playing the role of a password which can not be replaced if stolen, the necessity of...
Face recognition is a mature and trustworthy method for identifying individuals. Thanks to the avai...
User authentication is an important step to protect in- formation and in this field face biometrics ...
Spoofing attacks on biometric systems can seriously compromise their practical utility. In this pape...
Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses...
Many situations require users to log into a computer system. For example to perform private tasks li...
Many situations require users to log into a computer system. For example to perform private tasks li...
Spoofing attacks are one of the security traits that biometric recognition systems are proven to be ...
The biometric system is a security technology that uses information based on a living person's chara...
A spoofing attack is a situation in which one person successfully masquerades as another by falsifyi...
User authentication is an important step to protect information and in this field face biometrics is...
In recent decades, we have witnessed the evolution of biometric technology from the first pioneering...
To detect duplication of identity during authentication of online payment on mobile or personal comp...
In recent decades, the evolution of biometric technology from the first revolutionary works in faces...
The vulnerability of the face recognition system to spoofing attacks has piqued the biometric commun...
With biometrics playing the role of a password which can not be replaced if stolen, the necessity of...
Face recognition is a mature and trustworthy method for identifying individuals. Thanks to the avai...
User authentication is an important step to protect in- formation and in this field face biometrics ...
Spoofing attacks on biometric systems can seriously compromise their practical utility. In this pape...
Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses...
Many situations require users to log into a computer system. For example to perform private tasks li...
Many situations require users to log into a computer system. For example to perform private tasks li...
Spoofing attacks are one of the security traits that biometric recognition systems are proven to be ...