2018
DOI: 10.1007/978-981-13-1708-8_40
|View full text |Cite
|
Sign up to set email alerts
|

A Spoofing Security Approach for Facial Biometric Data Authentication in Unconstraint Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…e receptive field of a neuron is the extent of its scope in input data, and it is increased by stacking the convolution layers. e convolution operation is given as equation (1), where CB k is the k th convolution kernel weights and its bias term, respectively, and is expressing the convolution method.…”
Section: Convolution Neural Layermentioning
confidence: 99%
See 1 more Smart Citation
“…e receptive field of a neuron is the extent of its scope in input data, and it is increased by stacking the convolution layers. e convolution operation is given as equation (1), where CB k is the k th convolution kernel weights and its bias term, respectively, and is expressing the convolution method.…”
Section: Convolution Neural Layermentioning
confidence: 99%
“…The biometric system utilizes an individual's physiological or behavioural characteristics for identification, verification, and authentication. The invariable physiological characteristics include DNA, iris, fingerprint, palm, and facial expression [ 1 , 2 ], whereas behavioural traits cover voice, signature, and handwriting [ 1 , 3 , 4 ]. Physical characteristics such as fingerprint and iris are often used because of their high performance.…”
Section: Introductionmentioning
confidence: 99%
“…Similar to most Google services and features, the entire history and management are fully connected to the Google user account similar to most features and services offered by Google. GLH has been used to evaluate the habits of the users, as explained in Kumar and Sharma ( 2019 ), and the mobility of the user, as presented in Cheng et al ( 2020 ). Besides, GLH helps in visualization, as studied by Zhou et al ( 2020 ), including infrastructure planning, infectious disease control, and appropriate response to disastrous occasions.…”
Section: Experimental Setup and Working Strategy Of Proposed Smart Maskmentioning
confidence: 99%