2010 IEEE International Workshop on Information Forensics and Security 2010
DOI: 10.1109/wifs.2010.5711469
|View full text |Cite
|
Sign up to set email alerts
|

Multimodal fusion vulnerability to non-zero effort (spoof) imposters

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
91
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 53 publications
(92 citation statements)
references
References 10 publications
1
91
0
Order By: Relevance
“…The findings in [8], [9] and [10] indicate that fingerprint authentication systems suffer from a similar weakness. The same shortcoming on iris recognition systems has been diagnosed [11][12][13]. Finally, in [14] and [15], the spoofing attacks to speaker biometrics are addressed.…”
Section: Introductionmentioning
confidence: 99%
“…The findings in [8], [9] and [10] indicate that fingerprint authentication systems suffer from a similar weakness. The same shortcoming on iris recognition systems has been diagnosed [11][12][13]. Finally, in [14] and [15], the spoofing attacks to speaker biometrics are addressed.…”
Section: Introductionmentioning
confidence: 99%
“…However, Rodrigues et al [18] showed that such systems are even less secure if one of the biometric traits can be spoofed. Subsequently, Johnson et al [19], Akhtar et al [20], Marasco et al [21] proposed fusion methods more robust against spoofing attempts.…”
Section: Related Workmentioning
confidence: 99%
“…[23], [14] and [18] indicate that fingerprint authentication systems suffer from similar weakness. [11], [12] and [19] diagnose the same shortcoming on iris recognition systems. Finally, [5] and [7] address spoofing attacks to speaker biometrics.…”
Section: Introductionmentioning
confidence: 99%