2020
DOI: 10.1007/978-981-15-7961-5_82
|View full text |Cite
|
Sign up to set email alerts
|

An Overview of Biometrics and Face Spoofing Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
27
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 23 publications
(27 citation statements)
references
References 15 publications
0
27
0
Order By: Relevance
“…This high rate of success is most likely due to the difference in material and reflectivity between skin and mask which induce different noise characteristics (see Section 2.2 ). Determining real from masked faces can be exploited in detecting spoofing attacks [ 38 , 39 , 40 ].…”
Section: Distinguishing Real From Fake Faces Using Sensor Noisementioning
confidence: 99%
“…This high rate of success is most likely due to the difference in material and reflectivity between skin and mask which induce different noise characteristics (see Section 2.2 ). Determining real from masked faces can be exploited in detecting spoofing attacks [ 38 , 39 , 40 ].…”
Section: Distinguishing Real From Fake Faces Using Sensor Noisementioning
confidence: 99%
“…Partitioning, on the other hand, is based on pixel grouping based on their similarity to one another. The most crucial aspect of image processing is image segmentation [3,4]. Dividing an image into many sections gives it more significance and makes it easier to process.…”
Section: Introductionmentioning
confidence: 99%
“…Biometric authentication is basically biometric-based authentication. Biometrics can be used in criminal investigations, security and educational settings, and countless other places [6][7][8][9]. The most commonly used biometric strategies include iris, palm-print, voice, and a unique impression of the finger.…”
Section: Introductionmentioning
confidence: 99%