Deep learning techniques for biometric security: A systematic review of presentation attack detection systems

K Shaheed, P Szczuko, M Kumar, I Qureshi… - … Applications of Artificial …, 2024 - Elsevier
Biometric technology, including finger vein, fingerprint, iris, and face recognition, is widely
used to enhance security in various devices. In the past decade, significant progress has …

Detecting and mitigating adversarial perturbations for robust face recognition

G Goswami, A Agarwal, N Ratha, R Singh… - International Journal of …, 2019 - Springer
Deep neural network (DNN) architecture based models have high expressive power and
learning capacity. However, they are essentially a black box method since it is not easy to …

[HTML][HTML] Combining deep and handcrafted image features for presentation attack detection in face recognition systems using visible-light camera sensors

DT Nguyen, TD Pham, NR Baek, KR Park - Sensors, 2018 - mdpi.com
Although face recognition systems have wide application, they are vulnerable to
presentation attack samples (fake samples). Therefore, a presentation attack detection …

Discriminative representation combinations for accurate face spoofing detection

X Song, X Zhao, L Fang, T Lin - Pattern Recognition, 2019 - Elsevier
Three discriminative representations for face presentation attack detection are introduced in
this paper. Firstly we design a descriptor called spatial pyramid coding micro-texture (SPMT) …

An automated online proctoring system using attentive-net to assess student mischievous behavior

T Potluri, VS, VKK K - Multimedia Tools and Applications, 2023 - Springer
In recent years, the pandemic situation has forced the education system to shift from
traditional teaching to online teaching or blended learning. The ability to monitor remote …

[HTML][HTML] Optimization of CNN through novel training strategy for visual classification problems

SU Rehman, S Tu, OU Rehman, Y Huang… - Entropy, 2018 - mdpi.com
The convolution neural network (CNN) has achieved state-of-the-art performance in many
computer vision applications eg, classification, recognition, detection, etc. However, the …

How far did we get in face spoofing detection?

L Souza, L Oliveira, M Pamplona, J Papa - Engineering Applications of …, 2018 - Elsevier
The growing use of control access systems based on face recognition shed light over the
need for even more accurate systems to detect face spoofing attacks. In this paper, an …

Face spoofing detection using improved SegNet architecture with a blur estimation technique

S Kumar, S Singh, J Kumar - International Journal of …, 2021 - inderscienceonline.com
Biometrics has been increasingly used as the well-known technology for the identification
and verification of a person. Among the different biometric traits, the face has been …

A contemporary survey of unimodal liveness detection techniques: Challenges & opportunities

K Kavita, GS Walia, R Rohilla - 2020 3rd International …, 2020 - ieeexplore.ieee.org
Biometric recognition is an extensive and energizing field of research but spoofing attacks,"
a deceiver pretense as an authorized user by reproducing the biometrics of the original …

LBP and CNN feature fusion for face anti-spoofing

RP Singh, R Dash, RK Mohapatra - Pattern Analysis and Applications, 2023 - Springer
Face anti-spoofing has been attracting attention because of its prominent role in the security
of face recognition systems. A face spoofing attack is launched on the authentication system …