Spoofing and countermeasures for speaker verification: A survey

Z Wu, N Evans, T Kinnunen, J Yamagishi, F Alegre… - speech …, 2015‏ - Elsevier
While biometric authentication has advanced significantly in recent years, evidence shows
the technology can be susceptible to malicious spoofing attacks. The research community …

Face recognition under spoofing attacks: countermeasures and research directions

L Li, PL Correia, A Hadid - Iet Biometrics, 2018‏ - Wiley Online Library
Among tangible threats facing current biometric systems are spoofing attacks. A spoofing
attack occurs when a person tries to masquerade as someone else by falsifying data and …

Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition

J Galbally, S Marcel, J Fierrez - IEEE transactions on image …, 2013‏ - ieeexplore.ieee.org
To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured
synthetic or reconstructed sample is a significant problem in biometric authentication, which …

Biometric antispoofing methods: A survey in face recognition

J Galbally, S Marcel, J Fierrez - Ieee Access, 2014‏ - ieeexplore.ieee.org
In recent decades, we have witnessed the evolution of biometric technology from the first
pioneering works in face and voice recognition to the current state of development wherein a …

Overview of the combination of biometric matchers

A Lumini, L Nanni - Information Fusion, 2017‏ - Elsevier
Biometric identity verification refers to technologies used to measure human physical or
behavioral characteristics, which offer a radical alternative to passports, ID cards, driving …

[HTML][HTML] Anti-spoofing method for fingerprint recognition using patch based deep learning machine

DM Uliyan, S Sadeghi, HA Jalab - Engineering Science and Technology, an …, 2020‏ - Elsevier
Today's with increasing identity theft, biometric systems based on fingerprints have a
growing importance in protection and access restrictions. Malicious users violate them by …

Using visual rhythms for detecting video-based facial spoof attacks

A Pinto, WR Schwartz, H Pedrini… - IEEE Transactions …, 2015‏ - ieeexplore.ieee.org
Spoofing attacks or impersonation can be easily accomplished in a facial biometric system
wherein users without access privileges attempt to authenticate themselves as valid users …

Face recognition systems under spoofing attacks

I Chingovska, N Erdogmus, A Anjos… - Face Recognition Across …, 2016‏ - Springer
In this chapter, we give an overview of spoofing attacks and spoofing countermeasures for
face recognition systems, with a focus on visual spectrum systems (VIS) in 2D and 3D, as …

Multimodal biometric system based on fusion techniques: a review

N Bala, R Gupta, A Kumar - Information Security Journal: A Global …, 2022‏ - Taylor & Francis
Biometric allude to an automatic procedure of acknowledging an individual utilizing their
behavioral or physical characteristics. The biometric framework, which utilizes one cue for …