[1] | B. Biggio, Z. Akthar, G. Fumera, G. L. Marcialis, and F. Roli. Robustness of multimodal biometric verification systems under realistic spoofing attacks. 2011. [ bib ] |
[2] | Z. Akthar, G. Fumera, G. L. Marcialis, and F. Roli. Robustness analysis of likelihood ratio score fusion rule for multimodal biometric systems under spoof attacks. 2011. [ bib ] |
[3] | Z. Akthar, G. Fumera, G. L. Marcialis, and F. Roli. Robustness evaluation of biometric systems under spoof attacks. 2011. [ bib ] |
[4] | M. Martinez-Diaz, J. Fierrez, J. Galbally, and J. Ortega-Garcia. An evaluation of indirect attacks and countermeasures in fingerprint verification systems. Pattern Recognition Letters, 2011. [ bib ] |
[5] | J. Galbally, J. Fierrez, F. Alonso-Fernandez, and M. Martinez-Diaz. Evaluation of direct attacks to fingerprint verification systems. Telecommunication Systems, 2011. [ bib ] |
[6] | Z. Akthar, B. Biggio, G. Fumera, and G. L. Marcialis. Robustness of multimodal biometric systems under realistic spoof attacks against all traits. 2011. [ bib ] |
[7] | R. Wallace, M. McLaren, C. McCool, and S. Marcel. Inter-session variability modelling and joint factor analysis for face authentication. 2011. [ bib ] |
[8] | A. Hadid. Analyzing facial behavioural features from video. 2011. [ bib ] |
[9] | M. Gomez-Barrero, J. Galbally, J. Fierrez, and J. Ortega-Garcia. Hill-climbing attack based on the uphill simplex algorithm and its application to signature verification. 2011. [ bib ] |
[10] | X. Zhao, N. Evans, and J. L. Dugelay. A co-training approach to automatic face recognition. 2011. [ bib ] |
[11] | J. Määttä, A. Hadid, and M. Pietikäinen. Face spoofing detection from single images using micro-texture analysis. 2011. [ bib ] |
[12] | Z. Akthar, G. Fumera, G. L. Marcialis, and F. Roli. Performance prediction of biometric systems under spoof attacks. 2011. [ bib ] |
[13] | M. Chakka, A. Anjos, S. Marcel, R. Tronci, D. Muntoni, G. Fadda, M. Pili, N. Sirena, G. Murgia, M. Ristori, F. Roli, J. Yan, D. Yi, Z. Lei, Z. Zhang, S. Z. Li, W. R. Schwartz, A. Rocha, H. Pedrini, J. Lorenzo-Navarro, M. Castrillón-Santana, J. Määttä, A. Hadid, and M. Pietikäinen. Competition on counter measures to 2-d facial spoo fing attacks. 2011. [ bib ] |
[14] | A. Hadid, J. L. Dugelay, and M. Pietikäinen. On the use of dynamic features in face biometrics: Recent advances and challenges. Journal on Signal Image and Video Processing, 2011. [ bib ] |
[15] | J. Ylioinas, A. Hadid, and M. Pietikäinen. Combining contrast information and local binary patterns for gender classification. 2011. [ bib ] |
[16] | Z. Akthar, G. Fumera, G. L. Marcialis, and F. Roli. A method for performance evaluation of multi-modal biometric systems under spoofing attacks. 2011. [ bib ] |
[17] | A. Anjos and S. Marcel. Counter-measures to photo attacks in face recognition: a public database and a baseline. 2011. [ bib ] |
[18] | X. Zhao, N. Evans, and J. L. Dugelay. Semi-supervised face recognition with lda self-training. 2011. [ bib ] |
[19] | J. Komulainen, A. Hadid, and M. Pietikäinen. Face spoofing detection using dynamic texture. In Proceedings of ACCV Workshop on Computer Vision with Local Binary Pattern Variants (LBP 2012), 2012. [ bib ] |
[20] | J. Ylioinas, A. Hadid, Y. Guo, and M. Pietikäinen. Efficient image appearance description using dense sampling based local binary patterns. In Proceedings of the Asian Conference on Computer Vision, 2012. [ bib ] |
[21] | T. Huynh, R. Min, and J. L. Dugelay. An efficient lbp-based descriptor for facial depth images applied to gender recognition using rgb-d face data. In Proceedings of the Workshop on Computer Vision with Local Binary Pattern Variants, 2012. [ bib ] |
[22] | F. Alegre, R. Vipperla, N. Evans, and B. Fauve. On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals. In EUSIPCO 2012, 2012. [ bib ] |
[23] | A. Anjos, L. El-Shafey, R. Wallace, M. Guenther, C. McCool, and S. Marcel. Bob: a free signal processing and machine learning toolbox for researchers. In Proceedings of ACM MM 2012, 2012. [ bib ] |
[24] | I. Chingovska, A. Anjos, and S. Marcel. On the effectiveness of local binary patterns in face anti-spoofing. In Proceedings of BioSIG 2012, 2012. [ bib ] |
[25] | Z. Lei, S. Liao, and S. Z. Li. Efficient feature selection for linear discriminant analysis and its application to face recognition. In Proceedings of International Conference on Pattern Recognition, 2012. [ bib ] |
[26] | Z. Zhang, D. Yi, Z. Lei, and S. Z. Li. Regularized transfer boosting for face detection across spectrum. IEEE Signal Processing Letters, 2012. [ bib ] |
[27] | Z. Lei, Z. Zhang, and S. Z. Li. Feature space locality constraint for kernel based non- linear discriminant analysis. Pattern Recognition, 2012. [ bib ] |
[28] | E. Mordini and A. P. Rebera. Conceptualizing the biometric body. Yearbook 2012 of Digital Enlightenment Forum, 2012. [ bib ] |
[29] | A. Hadid, V. Ghahramani, V. Kellokumpu, M. Pietikäinen, J. Bustard, and M. Nixon. Can gait biometrics be spoofed? In Proceedings of ICPR 2012, 2012. [ bib ] |
[30] | S. Liu, D. Yi, Z. Lei, and S. Z. Li. Heterogeneous face image matching using multiscale features. 2012. [ bib ] |
[31] | J. Ylioinas, A. Hadid, and M. Pietikäinen. Age classification in unconstrained conditions using lbp variants. In Proceedings of ICPR 2012, 2012. [ bib ] |
[32] | D. Yambay, L. Ghiani, P. Denti, G. L. Marcialis, F. Roli, and S. Schuckers. Livdet 2011 - fingerprint liveness detection competition 2011. 2012. [ bib ] |
[33] | L. Ghiani, P. Denti, and G. L. Marcialis. Experimental results on fingerprint live- ness detection. In Proceedings of 7th Int. Conference on Articulated Motion and Deformable Objects, 2012. [ bib ] |
[34] | L. Ghiani, G. L. Marcialis, and F. Roli. Experimental results on the feature-level fusion of multiple fingerprint liveness detection algorithms. In Proceedings of 14th ACM Workshop on Multimedia and Security, 2012. [ bib ] |
[35] | N Kose, N. Erdogmus, and J. L. Dugelay. Block based face recognition approach robust to nose alteration. In Proceedings of BTAS 2012, 2012. [ bib ] |
[36] | N. Erdogmus, N Kose, and J. L. Dugelay. Impact analysis of nose alteration on face recognition performances. In Proceedings of MMSP 2012, 2012. [ bib ] |
[37] | B. Biggio, Z. Akthar, G. Fumera, G. L. Marcialis, and F. Roli. Security evaluation of biometric authentication systems under real spoofing attacks. IET Biometrics, 2012. [ bib ] |
[38] | Z. Akthar, G. Fumera, G. L. Marcialis, and F. Roli. Evaluation of serial and parallel multibiometric systems under spoofing attacks. In Proceedings of 5th International Conference on Biometrics: Theory, Applications, and Systems, 2012. [ bib ] |
[39] | L. Ghiani, G. L. Marcialis, and F. Roli. Fingerprint liveness detection by local phase quantization. In Proceedings of 21st Int. Conf. On Pattern Recognition, 2012. [ bib ] |
[40] | G. L. Marcialis, P. Coli, and F. Roli. Fingerprint liveness detection based on fake finger characteristics. International Journal of Digital Crime and Forensics, 2012. [ bib ] |
[41] | Z. Lei, D. Yi, and S. Z. Li. Discriminant image filter learning for face recognition with local binary pattern like representation. In Proceedings of IEEE International Conference on Computer Vision and Pattern Recognition, 2012. [ bib ] |
[42] | M. Gomez-Barrero, J. Galbally, J. Fierrez, and J. Ortega-Garcia. Face verification put to test: a hill-climbing attack based on the uphill-simplex algorithm. 2012. [ bib ] |
[43] | J. Galbally, J. Ortiz-Lopez, J. Fierrez, and J. Ortega-Garcia. Iris liveness detection based on quality related features. 2012. [ bib ] |
[44] | J. Zhu, D. Cao, S. Liu, Z. Lei, and S. Z. Li. Discriminant analysis with gabor phase for robust face recognition. 2012. [ bib ] |
[45] | F. Alegre, R. Vipperla, and N. Evans. Spoofing countermeasures for the protection of automatic speaker recognition from attacks with artificial signals. In Proceedings of INTERSPEECH 2012, 2012. [ bib ] |
[46] | Z. Lei, C. Zhou, D. Yi, A. K. Jain, and S. Z. Li. An improved coupled spectral regression for heterogeneous face recognition. 2012. [ bib ] |
[47] | Z. Zhang, J. Yan, S. Liu, Z. Lei, D. Yi, and S. Z. Li. A face antispoofing database with diverse attacks. 2012. [ bib ] |
[48] | D. Yambay, L. Ghiani, P. Denti, G. L. Marcialis, F. Roli, and S. Schuckers. Fingerprint liveness detection competition 2011. 2012. [ bib ] |
[49] | Z. Akthar, G. Fumera, G. L. Marcialis, and F. Roli. Evaluation of multi-modal biometric score fusion rules under spoof attacks. 2012. [ bib ] |
[50] | R. Wallace, M. McLaren, C. McCool, and S. Marcel. Cross-pollination of normalisation techniques from speaker to face authentication using gaussian mixture models. IEEE Transactions on Information Forensics and Security, 2012. [ bib ] |
[51] | E. Mordini and A. P. Rebera. No identification without representation: Global policy issues raised by large-scale biometric identification. Review of Policy Research, 2012. [ bib ] |
[52] | A. Hadid and M. Pietikäinen. Demographic classification from face videos using manifold learning. Neurocomputing, 2012. [ bib ] |
[53] | J. Galbally, F. Alonso-Fernandez, J. Fierrez, and J. Ortega-Garcia. A high performance fingerprint liveness detection method based on quality related features. Future Generation Computer Systems, 2012. [ bib ] |
[54] | G. Zhao, X. Huang, M. Taini, S. Z. Li, and M. Pietikäinen. Facial expression recognition from near-infrared videos. Image and Vision Computing, 2012. [ bib ] |
[55] | N Kose and J. L. Dugelay. Classification of captured and recaptured images to detect photograph spoofing. May 2012. [ bib ] |
[56] | L. Ghiani, A. Hadid, G. L. Marcialis, and F. Roli. ingerprint liveness detection us- ing bizanized statistical image features. In IEEE 6th International Conference on Biometrics: Theory, Applications, and Systems, (BTAS 2013), 2013. [ bib ] |
[57] | J. Bustard, J. N. Carter, and M. Nixon. Targeted impersonation as a tool for the detection of biometric system vulnerabilities. In Proceedings of the International Conference on Biometrics: Theory, Applications and Systems (BTAS), 2013. [ bib ] |
[58] | F. Alegre, R. Vipperla, A. Amehraye, and N. Evans. A one- class classification approach to generalised speaker verification spoofing countermea- sures using local binary patterns. In Proceedings of the International Conference on Biometrics: Theory, Applications and Systems (BTAS), 2013. [ bib ] |
[59] | F. Alegre, R. Vipperla, A. Amehraye, and N. Evans. A new speaker verification spoofing countermeasure based on local binary patterns. In 14th Annual Conference of the International Speech Communication Association., 2013. [ bib ] |
[60] | N. Evans, J. Yamagishi, and T. Kinnunen. Spoofing and counter- measures for speaker verification: a need for standard corpora, protocols and metrics. IEEE Signal Processing Society Newsletter, 2013. [ bib ] |
[61] | Spoofing and countermeasures for automatic speaker verification, 2013. [ bib ] |
[62] | E. Mordini. The two horns of forensic biometrics. EUROPEAN ASSOCIATION FOR BIOMETRICS (EAB) NEWSLETTER, 2013. [ bib ] |
[63] | A. P. Rebera, M. E. Bonfanti, and S. Vernier. Societal and ethical implications of anti-spoofing technologies in biometrics. Science and Engineering Ethics, 2013. [ bib ] |
[64] | N Kose and J. L. Dugelay. On the vulnerability of face recognition systems to spoofing mask attacks. In IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2013), 2013. [ bib ] |
[65] | Z. Cai, L. Wen, D. Cao, Z. Lei, D. Yi, and S. Z. Li. Person-specific face tracking with online recognition. In In Proceedings of the 10th IEEE International Conference on Automatic Face and Gesture Recognition, (FG2013), 2013. [ bib ] |
[66] | J. Yan, X. Zhang, L. Zhen, D. Yi, and S. Z. Li. Real-time high performance deformable model for face detection in the wild. In n Proceedings of the 6th IAPR International Conference on Biometrics, (ICB2013), 2013. [ bib ] |
[67] | J. Yan, X. Zhang, L. Zhen, D. Yi, and S. Z. Li. Structural models for face detection. In In Proceedings of the 10th IEEE International Conference on Automatic Face and Gesture Recognition, (FG2013), 2013. [ bib ] |
[68] | T. Wang, Y. Jianwei, L. Zhen, L. Shengcai, and S. Z. Li. Face liveness detection using 3d structure recovered from a single camera. In In Proceedings of the 6th IAPR International Conference on Biometrics, (ICB2013), 2013. [ bib ] |
[69] | Y. Jianwei, L. Zhen, L. Shengcai, and S. Z. Li. Face liveness detection with component dependent descriptor. In In Proceedings of the 6th IAPR International Conference on Biometrics, (ICB2013), 2013. [ bib ] |
[70] | N Kose and J. L. Dugelay. Reflectance analysis based countermeasure technique to detect face mask attacks. In IEEE International Conference on Digital Signal Processing (DSP 2013), 2013. [ bib ] |
[71] | N Kose and J. L. Dugelay. Shape and texture based countermeasure to protect face recognition systems against mask attacks. In IEEE Computer Society Workshop on Biometrics (CVPRW 2013), 2013. [ bib ] |
[72] | X. Feng, Y. Lai, X. Peng, X. Jiang, and A. Hadid. Extracting local binary patterns from image key points: application to automatic facial expression recognition. In Proc. 18th Scandinavian Conference on Image Analysis (SCIA2013), 2013. [ bib ] |
[73] | N Kose and J. L. Dugelay. Countermeasure for the protection of face recognition systems against mask attacks. In Proceedings of the 10th IEEE International Conference on Automatic Face and Gesture Recognition, 2013. [ bib ] |
[74] | B. Biggio, L. Didaci, G. Fumera, and F. Roli. Poisoning attacks to compromise face templates. In International Conference on Biometrics, 2013. [ bib ] |
[75] | B. Biggio, G. Fumera, and F. Roli. Security evaluation of pattern classifiers under attack. IEEE Trans. on Knowl. and Data Engineering, 2013. [ bib ] |
[76] | J. Bustard, J. N. Carter, and M. Nixon. Targeted biometric impersonation. In Proceedings of the Workshop on Biometrics and Forensics, 2013. [ bib ] |
[77] | J. Komulainen, A. Hadid, M. Pietikäinen, A. Anjos, and S. Marcel. Complementary countermeasures for detecting scenic face spoofing attacks. In International Conference on Biometrics, 2013. [ bib ] |
[78] | F. Alegre, A. Fillatre, and N. Evans. Spoofing countermeasures to protect automatic speaker verification from voice conversion. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, 2013. [ bib ] |
[79] | T. de Freitas Pereira, A. Anjos, J. M. De Martino, and S. Marcel. Can face anti-spoofing countermeasures work in a real world scenario? In International Conference on Biometrics, 2013. [ bib ] |
This file was generated by bibtex2html 1.98.