tabularasa-publications.bib

@inproceedings{proc4,
  author = {Kose, N and Dugelay, J. -L.},
  month = may,
  title = {Classification of Captured and Recaptured Images to Detect Photograph Spoofing},
  year = {2012},
  location = {Dhakka  Bangladesh}
}
@inproceedings{proc12,
  author = {Zhao, X. and Evans, N. and Dugelay, J. -L.},
  title = {Semi-supervised Face Recognition with LDA Self-training},
  year = {2011}
}
@inproceedings{proc18,
  author = {Anjos, A. and Marcel, S.},
  title = {Counter-Measures to Photo Attacks in Face Recognition: a public database and a baseline},
  year = {2011}
}
@inproceedings{proc24,
  author = {Akthar, Z. and Fumera, G. and Marcialis, G. L. and Roli, F.},
  title = {A method for performance evaluation of multi-modal biometric systems under spoofing attacks},
  year = {2011}
}
@inproceedings{proc30,
  author = {Ylioinas, J. and Hadid, A. and Pietikäinen, M.},
  title = {Combining contrast information and local binary patterns for gender classification},
  year = {2011}
}
@article{art36,
  author = {Hadid, A. and Dugelay, J. -L. and Pietikäinen, M.},
  title = {On the Use of Dynamic Features in Face Biometrics: Recent Advances and Challenges},
  journal = {Journal on Signal Image and Video Processing},
  year = {2011}
}
@inproceedings{proc43,
  author = {Chakka, M. and Anjos, A. and Marcel, S. and Tronci, R. and Muntoni, D. and Fadda, G. and Pili, M. and Sirena, N. and Murgia, G. and Ristori, M. and Roli, F. and Yan, J. and Yi, D. and Lei, Z. and Zhang, Z. and Li, S. Z. and Schwartz, W. R. and Rocha, A. and Pedrini, H. and Lorenzo-Navarro, J. and Castrillón-Santana, M. and Määttä, J. and Hadid, A. and Pietikäinen, M.},
  title = {Competition on Counter Measures to 2-D Facial Spoo fing Attacks},
  year = {2011}
}
@inproceedings{proc49,
  author = {Akthar, Z. and Fumera, G. and Marcialis, G. L. and Roli, F.},
  title = {Performance Prediction of Biometric Systems under Spoof Attacks},
  year = {2011}
}
@inproceedings{proc55,
  author = {Määttä, J. and Hadid, A. and Pietikäinen, M.},
  title = {Face Spoofing Detection From Single Images Using Micro-Texture Analysis},
  year = {2011}
}
@article{art61,
  author = {Zhao, G. and Huang, X. and Taini, M. and Li, S. Z. and Pietikäinen, M.},
  title = {Facial expression recognition from near-infrared videos},
  journal = {Image and Vision Computing},
  year = {2012}
}
@inproceedings{proc68,
  author = {Zhao, X. and Evans, N. and Dugelay, J. -L.},
  title = {A Co-training Approach to Automatic Face Recognition},
  year = {2011}
}
@inproceedings{proc74,
  author = {Gomez-Barrero, M. and Galbally, J. and Fierrez, J. and Ortega-Garcia, J.},
  title = {Hill-Climbing Attack Based on the Uphill Simplex Algorithm and its Application to Signature Verification},
  year = {2011}
}
@article{art80,
  author = {Galbally, J. and Alonso-Fernandez, F. and Fierrez, J. and Ortega-Garcia, J.},
  title = {A High Performance Fingerprint Liveness Detection Method Based on Quality Related Features},
  journal = {Future Generation Computer Systems},
  year = {2012}
}
@inproceedings{proc87,
  author = {Hadid, A.},
  title = {Analyzing facial behavioural features from video},
  year = {2011}
}
@article{art93,
  author = {Hadid, A. and Pietikäinen, M.},
  title = {Demographic Classification From Face Videos Using Manifold Learning},
  journal = {Neurocomputing},
  year = {2012}
}
@inproceedings{proc100,
  author = {Wallace, R. and McLaren, M. and McCool, C. and Marcel, S.},
  title = {Inter-session Variability Modelling and Joint Factor Analysis for Face Authentication},
  year = {2011}
}
@inproceedings{proc106,
  author = {Akthar, Z. and Biggio, B. and Fumera, G. and Marcialis, G. L.},
  title = {Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks against All Traits},
  year = {2011}
}
@article{art112,
  author = {Galbally, J. and Fierrez, J. and Alonso-Fernandez, F. and Martinez-Diaz, M.},
  title = {Evaluation of Direct Attacks to Fingerprint Verification Systems},
  journal = {Telecommunication Systems},
  year = {2011}
}
@article{art119,
  author = {Martinez-Diaz, M. and Fierrez, J. and Galbally, J. and Ortega-Garcia, J.},
  title = {An evaluation of indirect attacks and countermeasures in fingerprint verification systems},
  journal = {Pattern Recognition Letters},
  year = {2011}
}
@inproceedings{proc126,
  author = {Akthar, Z. and Fumera, G. and Marcialis, G. L. and Roli, F.},
  title = {Robustness Evaluation of Biometric Systems under Spoof Attacks},
  year = {2011}
}
@inproceedings{proc132,
  author = {Akthar, Z. and Fumera, G. and Marcialis, G. L. and Roli, F.},
  title = {Robustness analysis of likelihood ratio score fusion rule for multimodal biometric systems under spoof attacks},
  year = {2011}
}
@article{art138,
  author = {Mordini, E. and Rebera, A. P.},
  title = {No Identification without Representation: Global Policy Issues Raised By Large-Scale Biometric Identification},
  journal = {Review of Policy Research},
  year = {2012}
}
@article{art145,
  author = {Wallace, R. and McLaren, M. and McCool, C. and Marcel, S.},
  title = {Cross-pollination of normalisation techniques from speaker to face authentication using Gaussian mixture models},
  journal = {IEEE Transactions on Information Forensics and Security},
  year = {2012}
}
@inproceedings{proc152,
  author = {Akthar, Z. and Fumera, G. and Marcialis, G. L. and Roli, F.},
  title = {Evaluation of multi-modal biometric score fusion rules under spoof attacks},
  year = {2012}
}
@inproceedings{proc158,
  author = {Yambay, D. and Ghiani, L. and Denti, P. and Marcialis, G. L. and Roli, F. and Schuckers, S.},
  title = {Fingerprint Liveness Detection Competition 2011},
  year = {2012}
}
@inproceedings{proc164,
  author = {Zhang, Z. and Yan, J. and Liu, S. and Lei, Z. and Yi, D. and Li, S. Z.},
  title = {A Face Antispoofing Database with Diverse Attacks},
  year = {2012}
}
@inproceedings{proc170,
  author = {Lei, Z. and Zhou, C. and Yi, D. and Jain, A. K. and Li, S. Z.},
  title = {An Improved Coupled Spectral Regression for Heterogeneous Face Recognition},
  year = {2012}
}
@inproceedings{proc176,
  author = {Alegre, F. and Vipperla, R. and Evans, N.},
  title = {Spoofing countermeasures for the protection of automatic speaker recognition from attacks with artificial signals},
  booktitle = {Proceedings of INTERSPEECH 2012},
  year = {2012}
}
@inproceedings{proc183,
  author = {Zhu, J. and Cao, D. and Liu, S. and Lei, Z. and Li, S. Z.},
  title = {Discriminant Analysis with Gabor Phase for Robust Face Recognition},
  year = {2012}
}
@inproceedings{proc189,
  author = {Galbally, J. and Ortiz-Lopez, J. and Fierrez, J. and Ortega-Garcia, J.},
  title = {Iris liveness detection based on quality related features},
  year = {2012}
}
@inproceedings{proc195,
  author = {Gomez-Barrero, M. and Galbally, J. and Fierrez, J. and Ortega-Garcia, J.},
  title = {Face verification put to test: a hill-climbing attack based on the uphill-simplex algorithm},
  year = {2012}
}
@inproceedings{proc201,
  author = {Biggio, B. and Akthar, Z. and Fumera, G. and Marcialis, G. L. and Roli, F.},
  title = {Robustness of multimodal biometric verification systems under realistic spoofing attacks},
  year = {2011}
}
@inproceedings{proc207,
  author = {Lei, Z. and Yi, D. and Li, S. Z.},
  title = {Discriminant Image Filter Learning for Face Recognition with Local Binary Pattern Like Representation},
  booktitle = {Proceedings of IEEE International Conference on Computer Vision and Pattern Recognition},
  year = {2012}
}
@article{art214,
  author = {Marcialis, G. L. and Coli, P. and Roli, F.},
  title = {Fingerprint Liveness Detection based on Fake Finger characteristics},
  journal = {International Journal of Digital Crime and Forensics},
  year = {2012}
}
@inproceedings{proc221,
  author = {Ghiani, L. and Marcialis, G. L. and Roli, F.},
  title = {Fingerprint Liveness Detection by Local Phase Quantization},
  booktitle = {Proceedings of 21st Int. Conf. On Pattern Recognition},
  year = {2012}
}
@inproceedings{proc228,
  author = {Akthar, Z. and Fumera, G. and Marcialis, G. L. and Roli, F.},
  title = {Evaluation of serial and parallel multibiometric systems under spoofing attacks},
  booktitle = {Proceedings of 5th International Conference on Biometrics: Theory, Applications, and Systems},
  year = {2012}
}
@article{art235,
  author = {Biggio, B. and Akthar, Z. and Fumera, G. and Marcialis, G. L. and Roli, F.},
  title = {Security evaluation of biometric authentication systems under real spoofing attacks},
  journal = {IET Biometrics},
  year = {2012}
}
@inproceedings{proc242,
  author = {Erdogmus, N. and Kose, N and Dugelay, J. -L.},
  title = {Impact Analysis of Nose Alteration on Face Recognition Performances},
  booktitle = {Proceedings of MMSP 2012},
  year = {2012}
}
@inproceedings{proc249,
  author = {Kose, N and Erdogmus, N. and Dugelay, J. -L.},
  title = {Block Based Face Recognition Approach Robust to Nose Alteration},
  booktitle = {Proceedings of BTAS 2012},
  year = {2012}
}
@inproceedings{proc256,
  author = {Ghiani, L. and Marcialis, G. L. and Roli, F.},
  title = {Experimental Results on the Feature-level Fusion of Multiple Fingerprint Liveness Detection Algorithms},
  booktitle = {Proceedings of 14th ACM Workshop on Multimedia and Security},
  year = {2012}
}
@inproceedings{proc263,
  author = {Ghiani, L. and Denti, P. and Marcialis, G. L.},
  title = {Experimental Results on Fingerprint Live- ness Detection},
  booktitle = {Proceedings of 7th Int. Conference on Articulated Motion and Deformable Objects},
  year = {2012}
}
@inproceedings{proc270,
  author = {Yambay, D. and Ghiani, L. and Denti, P. and Marcialis, G. L. and Roli, F. and Schuckers, S.},
  title = {LivDet 2011 - Fingerprint Liveness Detection Competition 2011},
  year = {2012}
}
@inproceedings{proc276,
  author = {Ylioinas, J. and Hadid, A. and Pietikäinen, M.},
  title = {Age Classification in Unconstrained Conditions Using LBP Variants},
  booktitle = {Proceedings of ICPR 2012},
  year = {2012}
}
@inproceedings{proc283,
  author = {Liu, S. and Yi, D. and Lei, Z. and Li, S. Z.},
  title = {Heterogeneous Face Image Matching Using Multiscale Features},
  year = {2012}
}
@inproceedings{proc289,
  author = {Hadid, A. and Ghahramani, V. and Kellokumpu, V. and Pietikäinen, M. and Bustard, J. and Nixon, M.},
  title = {Can Gait Biometrics be Spoofed?},
  booktitle = {Proceedings of ICPR 2012},
  year = {2012}
}
@article{art296,
  author = {Mordini, E. and Rebera, A. P.},
  title = {Conceptualizing the Biometric Body},
  journal = {Yearbook 2012 of Digital Enlightenment Forum},
  year = {2012}
}
@article{art303,
  author = {Lei, Z. and Zhang, Z. and Li, S. Z.},
  title = {Feature Space Locality Constraint for Kernel based Non- linear Discriminant Analysis},
  journal = {Pattern Recognition},
  year = {2012}
}
@article{art310,
  author = {Zhang, Z. and Yi, D. and Lei, Z. and Li, S. Z.},
  title = {Regularized Transfer Boosting for Face Detection Across Spectrum},
  journal = {IEEE Signal Processing Letters},
  year = {2012}
}
@inproceedings{proc317,
  author = {Lei, Z. and Liao, S. and Li, S. Z.},
  title = {Efficient Feature Selection for Linear Discriminant Analysis and Its Application to Face Recognition},
  booktitle = {Proceedings of International Conference on Pattern Recognition},
  year = {2012}
}
@inproceedings{proc324,
  author = {Chingovska, I. and Anjos, A. and Marcel, S.},
  title = {On the Effectiveness of Local Binary Patterns in Face Anti-spoofing},
  booktitle = {Proceedings of BioSIG 2012},
  year = {2012}
}
@inproceedings{proc331,
  author = {Anjos, A. and El-Shafey, L. and Wallace, R. and Guenther, M. and McCool, C. and Marcel, S.},
  title = {Bob: a free signal processing and machine learning toolbox for researchers},
  booktitle = {Proceedings of ACM MM 2012},
  year = {2012}
}
@inproceedings{proc338,
  author = {Alegre, F. and Vipperla, R. and Evans, N. and Fauve, B.},
  title = {On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals},
  booktitle = {EUSIPCO 2012},
  year = {2012}
}
@inproceedings{proc345,
  author = {de Freitas Pereira, T. and Anjos, A. and De Martino, J. M. and Marcel, S.},
  title = {Can face anti-spoofing countermeasures work in a real world scenario?},
  booktitle = {International Conference on Biometrics},
  year = {2013}
}
@inproceedings{proc352,
  author = {Huynh, T. and Min, R. and Dugelay, J. -L.},
  title = {An efficient LBP-based descriptor for facial depth images applied to gender recognition using RGB-D face data},
  booktitle = {Proceedings of the Workshop on Computer Vision with Local Binary Pattern Variants},
  year = {2012}
}
@inproceedings{proc359,
  author = {Alegre, F. and Fillatre, A. and Evans, N.},
  title = {Spoofing countermeasures to protect automatic speaker verification from voice conversion},
  booktitle = {Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing},
  year = {2013}
}
@inproceedings{proc366,
  author = {Komulainen, J. and Hadid, A. and Pietikäinen, M. and Anjos, A. and Marcel, S.},
  title = {Complementary Countermeasures for Detecting Scenic Face Spoofing Attacks},
  booktitle = {International Conference on Biometrics},
  year = {2013}
}
@inproceedings{proc373,
  author = {Ylioinas, J. and Hadid, A. and Guo, Y. and Pietikäinen, M.},
  title = {Efficient image appearance description using dense sampling based local binary patterns},
  booktitle = {Proceedings of the Asian Conference on Computer Vision},
  year = {2012}
}
@inproceedings{proc380,
  author = {Bustard, J. and Carter, J. N. and Nixon, M.},
  title = {Targeted biometric impersonation},
  booktitle = {Proceedings of the Workshop on Biometrics and Forensics},
  year = {2013}
}
@article{art387,
  author = {Biggio, B. and Fumera, G. and Roli, F.},
  title = {Security evaluation of pattern classifiers under attack},
  journal = {IEEE Trans. on Knowl. and Data Engineering},
  year = {2013}
}
@inproceedings{proc394,
  author = {Biggio, B. and Didaci, L. and Fumera, G. and Roli, F.},
  title = {Poisoning attacks to compromise face templates},
  booktitle = {International Conference on Biometrics},
  year = {2013}
}
@inproceedings{proc401,
  author = {Kose, N and Dugelay, J. -L.},
  title = {Countermeasure for the Protection of Face Recognition Systems Against Mask Attacks.},
  booktitle = {Proceedings of the 10th IEEE International Conference on Automatic Face and Gesture Recognition},
  year = {2013}
}
@inproceedings{proc408,
  author = {Feng, X. and Lai, Y. and Peng, X. and Jiang, X. and Hadid, A.},
  title = {Extracting Local Binary Patterns from image key points: application to automatic facial expression recognition},
  booktitle = {Proc. 18th Scandinavian Conference on Image Analysis (SCIA2013)},
  year = {2013}
}
@inproceedings{proc415,
  author = {Komulainen, J. and Hadid, A. and Pietikäinen, M.},
  title = {Face spoofing detection using dynamic texture},
  booktitle = {Proceedings of  ACCV Workshop on Computer Vision with Local Binary Pattern Variants (LBP 2012)},
  year = {2012}
}
@inproceedings{proc422,
  author = {Kose, N and Dugelay, J. -L.},
  title = {Shape and Texture Based Countermeasure to Protect Face Recognition Systems Against Mask Attacks.},
  booktitle = {IEEE Computer Society Workshop on Biometrics (CVPRW 2013)},
  year = {2013}
}
@inproceedings{proc429,
  author = {Kose, N and Dugelay, J. -L.},
  title = {Reflectance Analysis Based Countermeasure Technique to Detect Face Mask Attacks},
  booktitle = {IEEE International Conference on Digital Signal Processing (DSP 2013)},
  year = {2013}
}
@inproceedings{proc436,
  author = {Jianwei, Y. and Zhen, L. and Shengcai, L. and Li, S. Z.},
  title = {Face Liveness Detection with Component Dependent Descriptor},
  booktitle = {In Proceedings of the 6th IAPR International Conference on Biometrics, (ICB2013)},
  year = {2013}
}
@inproceedings{proc443,
  author = {Wang, T. and Jianwei, Y. and Zhen, L. and Shengcai, L. and Li, S. Z.},
  title = {Face Liveness Detection Using 3D Structure Recovered from a Single Camera},
  booktitle = {In Proceedings of the 6th IAPR International Conference on Biometrics, (ICB2013)},
  year = {2013}
}
@inproceedings{proc450,
  author = {Yan, J. and Zhang, X. and Zhen, L. and Yi, D. and Li, S. Z.},
  title = {Structural Models for Face Detection},
  booktitle = {In Proceedings of the 10th IEEE International Conference on Automatic Face and Gesture Recognition, (FG2013)},
  year = {2013}
}
@inproceedings{proc457,
  author = {Yan, J. and Zhang, X. and Zhen, L. and Yi, D. and Li, S. Z.},
  title = {Real-time High Performance Deformable Model for Face Detection in the Wild},
  booktitle = {n Proceedings of the 6th IAPR International Conference on Biometrics, (ICB2013)},
  year = {2013}
}
@inproceedings{proc464,
  author = {Cai, Z. and Wen, L. and Cao, D. and Lei, Z. and Yi, D. and Li, S. Z.},
  title = {Person-Specific Face Tracking with Online Recognition},
  booktitle = {In Proceedings of the 10th IEEE International Conference on Automatic Face and Gesture Recognition, (FG2013)},
  year = {2013}
}
@inproceedings{proc471,
  author = {Kose, N and Dugelay, J. -L.},
  title = {On the Vulnerability of Face Recognition Systems to Spoofing Mask Attacks},
  booktitle = {IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2013)},
  year = {2013}
}
@article{art478,
  author = {Rebera, A. P. and Bonfanti, M. E. and Vernier, S.},
  title = {Societal and Ethical Implications of Anti-Spoofing Technologies in Biometrics},
  journal = {Science and Engineering Ethics},
  year = {2013}
}
@article{art485,
  author = {Mordini, E.},
  title = {The Two Horns of Forensic Biometrics},
  journal = {EUROPEAN ASSOCIATION FOR BIOMETRICS (EAB) NEWSLETTER},
  year = {2013}
}
@proceedings{proc492,
  author = {Evans, N. and Kinnunen, T. and Yamagishi, J.},
  title = {Spoofing and countermeasures for automatic speaker verification},
  booktitle = {14th Annual Conference of the International Speech Communication Association},
  year = {2013}
}
@article{art499,
  author = {Evans, N. and Yamagishi, J. and Kinnunen, T.},
  title = {Spoofing and counter- measures for speaker verification: a need for standard corpora, protocols and metrics},
  journal = {IEEE Signal Processing Society Newsletter},
  year = {2013}
}
@inproceedings{proc506,
  author = {Alegre, F. and Vipperla, R. and Amehraye, A. and Evans, N.},
  title = {A new speaker verification spoofing countermeasure based on local binary patterns},
  booktitle = {14th Annual Conference of the International Speech Communication Association.},
  year = {2013}
}
@inproceedings{proc513,
  author = {Alegre, F. and Vipperla, R. and Amehraye, A. and Evans, N.},
  title = {A one- class classification approach to generalised speaker verification spoofing countermea- sures using local binary patterns},
  booktitle = {Proceedings of the International Conference on Biometrics: Theory, Applications and Systems (BTAS)},
  year = {2013}
}
@inproceedings{proc520,
  author = {Bustard, J. and Carter, J. N. and Nixon, M.},
  title = {Targeted Impersonation As A Tool For The Detection Of Biometric System Vulnerabilities},
  booktitle = {Proceedings of the International Conference on Biometrics: Theory, Applications and Systems (BTAS)},
  year = {2013}
}
@inproceedings{proc527,
  author = {Ghiani, L. and Hadid, A. and Marcialis, G. L. and Roli, F.},
  title = {ingerprint Liveness Detection us- ing Bizanized Statistical Image Features},
  booktitle = {IEEE 6th International Conference on Biometrics: Theory, Applications, and Systems, (BTAS 2013)},
  year = {2013}
}

This file was generated by bibtex2html 1.98.