Joshi, 2019 - Google Patents
A STUDY OF ANTI SPOOFING: VITAL IN FACE RECOGNITION SYSTEMS.Joshi, 2019
View PDF- Document ID
- 17326312504793614467
- Author
- Joshi T
- Publication year
- Publication venue
- I-Manager's Journal of Pattern Recognition
External Links
Snippet
Face recognition is the second most widely used biometric approach after fingerprint. The applications of Face recognition are widely accepted and finding their space either at an organization or individual level due its adaptability among the people. But FR systems are …
- 238000001514 detection method 0 abstract description 79
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
- G06K9/00073—Extracting features related to minutiae and pores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00087—Matching; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00013—Image acquisition
- G06K9/00046—Image acquisition by using geometrical optics, e.g. using prisms
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dargan et al. | A comprehensive survey on the biometric recognition systems based on physiological and behavioral modalities | |
Chakraborty et al. | An overview of face liveness detection | |
Bowyer et al. | A survey of iris biometrics research: 2008–2010 | |
Chan et al. | Face liveness detection using a flash against 2D spoofing attack | |
US9189686B2 (en) | Apparatus and method for iris image analysis | |
Anthony et al. | A review of face anti-spoofing methods for face recognition systems | |
Gupta et al. | A survey of attacks on iris biometric systems | |
Maček et al. | Multimodal biometric authentication in IoT: Single camera case study | |
Kavita et al. | A contemporary survey of unimodal liveness detection techniques: Challenges & opportunities | |
Rajalakshmi et al. | A multimodal architecture using Adapt‐HKFCT segmentation and feature‐based chaos integrated deep neural networks (Chaos‐DNN‐SPOA) for contactless biometricpalm vein recognition system | |
Yin et al. | Fusion of face recognition and facial expression detection for authentication: a proposed model | |
Das et al. | Face liveness detection based on frequency and micro-texture analysis | |
Proença | Unconstrained iris recognition in visible wavelengths | |
Kaur et al. | Estimation towards the impact of contact lens in iris recognition: A study | |
Cui | A scheme of human face recognition in complex environments | |
Xin et al. | A survey of liveness detection methods for face biometric systems | |
Joshi | A STUDY OF ANTI SPOOFING: VITAL IN FACE RECOGNITION SYSTEMS. | |
SulaimanAlshebli et al. | The cyber security biometric authentication based on liveness face-iris images and deep learning classifier | |
Arora et al. | Liveness and threat aware selfie face recognition | |
GÜNDOĞAR et al. | Presentation attack detection for face recognition using remotephotoplethysmography and cascaded fusion | |
Patil et al. | Image Quality (IQ) based liveness detection system for multi-biometric detection | |
Vinutha et al. | Antispoofing in face biometrics: A comprehensive study on software-based techniques | |
Venkata Ramana et al. | Hybrid biometric based person identification using machine learning | |
Favorskaya | Face presentation attack detection: Research opportunities and perspectives | |
Motwakel et al. | Presentation Attack Detection (PAD) for Iris Recognition System on Mobile Devices-A Survey |