Computationally efficient face spoofing detection with motion magnification

S Bharadwaj, TI Dhamecha, M Vatsa… - Proceedings of the IEEE …, 2013 - cv-foundation.org
For a robust face biometric system, a reliable antispoofing approach must be deployed to
circumvent the print and replay attacks. Several techniques have been proposed to counter …

Face anti-spoofing with multifeature videolet aggregation

TA Siddiqui, S Bharadwaj, TI Dhamecha… - 2016 23rd …, 2016 - ieeexplore.ieee.org
Biometric systems can be attacked in several ways and the most common being spoofing
the input sensor. Therefore, anti-spoofing is one of the most essential prerequisite against …

Freely typed keystroke dynamics-based user authentication for mobile devices based on heterogeneous features

J Kim, P Kang - Pattern Recognition, 2020 - Elsevier
Keystroke dynamics-based authentication (KDA) is one of the human behavioral biometric-
based user authentication methods based on the unique ty** pattern of a person …

Continuous authentication on mobile devices by analysis of ty** motion behavior

H Gascon, S Uellenbeck, C Wolf, K Rieck - 2014 - dl.gi.de
Smartphones have become the standard personal device to store private or sensitive
information. Widely used as every day gadget, however, they are susceptible to get lost or …

Attention-aware dual-stream network for multimodal face anti-spoofing

P Deng, C Ge, X Qiao, H Wei… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Since the rapid development of face recognition systems using 3D cameras, the public has
demanded great safety regulations for these devices. As a closely related topic, multimodal …

Face flashing: a secure liveness detection protocol based on light reflections

D Tang, Z Zhou, Y Zhang, K Zhang - arxiv preprint arxiv:1801.01949, 2018 - arxiv.org
Face authentication systems are becoming increasingly prevalent, especially with the rapid
development of Deep Learning technologies. However, human facial information is easy to …

On the Impact of Touch {ID} on {iPhone} Passcodes

I Cherapau, I Muslukhov, N Asanka… - Eleventh Symposium On …, 2015 - usenix.org
Smartphones today store large amounts of data that can be confidential, private or sensitive.
To protect such data, all mobile OSs have a phone lock mechanism, a mechanism that …

A survey of mobile face biometrics

A Rattani, R Derakhshani - Computers & Electrical Engineering, 2018 - Elsevier
Face biometrics have attracted significant attention as a technology for secure access to
mobile devices. This is because almost all smartphones have RGB cameras suitable for …

Light can hack your face! black-box backdoor attack on face recognition systems

H Li, Y Wang, X **e, Y Liu, S Wang, R Wan… - arxiv preprint arxiv …, 2020 - arxiv.org
Deep neural networks (DNN) have shown great success in many computer vision
applications. However, they are also known to be susceptible to backdoor attacks. When …

Seeing your face is not enough: An inertial sensor-based liveness detection for face authentication

Y Li, Y Li, Q Yan, H Kong, RH Deng - Proceedings of the 22nd ACM …, 2015 - dl.acm.org
Leveraging built-in cameras on smartphones and tablets, face authentication provides an
attractive alternative of legacy passwords due to its memory-less authentication process …