2017
DOI: 10.1007/s11760-017-1082-y
|View full text |Cite
|
Sign up to set email alerts
|

Spoof detection on face and palmprint biometrics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(24 citation statements)
references
References 20 publications
0
21
0
Order By: Relevance
“…The HOG descriptor is one of the most popular approaches for object detection. It is invariant to illumination and geometric transformations and it has been successfully applied to many security applications, such as privacy in image feature extraction using homomorphic encryption [40], phishing detection [41], classification of sensitive information embedded within uploaded photos [42], handwritten digits recognition [43], facial expression recognition with CNNs [44] and, particularly, to face spoofing detection [11,[45][46][47][48]. Due to its popularity in anti-spoofing detection, in this work a variant of the HOG descriptor will be presented and experimentally validated.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The HOG descriptor is one of the most popular approaches for object detection. It is invariant to illumination and geometric transformations and it has been successfully applied to many security applications, such as privacy in image feature extraction using homomorphic encryption [40], phishing detection [41], classification of sensitive information embedded within uploaded photos [42], handwritten digits recognition [43], facial expression recognition with CNNs [44] and, particularly, to face spoofing detection [11,[45][46][47][48]. Due to its popularity in anti-spoofing detection, in this work a variant of the HOG descriptor will be presented and experimentally validated.…”
Section: Related Workmentioning
confidence: 99%
“…Because of this, most security systems provide some kind of protection such as hashing, digital signature or encryption that are ineffective in spoof attacks [5]. In the last few years there has been an intensive research to provide reliable anti-spoofing systems for biometric traits, including fingerprints [6,7], face [8][9][10], and other biometric features [11][12][13].…”
Section: Introductionmentioning
confidence: 99%
“…Finally, multimodal biometric systems are less likely to be spoofed as impostors, since one has to forge multiple biometric features at the same time. For this reason, different works addressed the impostor problem by combining two or more human characteristics [91,92,93,94,95,96,97].…”
Section: Future Perspectivesmentioning
confidence: 99%
“…A method for detecting presentation attacks in dorsal hand-vein biometrics is introduced by Bhilare et al in [14], employing a histogram of oriented gradients performed on LoG-filtered images and an SVM with majority voting for image classification, reaching EER from 0.16% to 0.8%. A fusion of texture-based approaches and image quality assessment for face and palmprint PAD is introduced by Farmanbar and Toygar in [15], and tested on several publicly available datasets of face and palmprint samples. Bhilare et al followed up on their earlier work in [16], introduing a spoof sample database -'PALMspoof', and a PAD method that is said to outperform their earlier LBP-based approach by 12.73 percentage points in classification error rate.…”
Section: Related Workmentioning
confidence: 99%