Computationally efficient face spoofing detection with motion magnification
For a robust face biometric system, a reliable antispoofing approach must be deployed to
circumvent the print and replay attacks. Several techniques have been proposed to counter …
circumvent the print and replay attacks. Several techniques have been proposed to counter …
Face anti-spoofing with multifeature videolet aggregation
Biometric systems can be attacked in several ways and the most common being spoofing
the input sensor. Therefore, anti-spoofing is one of the most essential prerequisite against …
the input sensor. Therefore, anti-spoofing is one of the most essential prerequisite against …
Freely typed keystroke dynamics-based user authentication for mobile devices based on heterogeneous features
Keystroke dynamics-based authentication (KDA) is one of the human behavioral biometric-
based user authentication methods based on the unique ty** pattern of a person …
based user authentication methods based on the unique ty** pattern of a person …
Continuous authentication on mobile devices by analysis of ty** motion behavior
Smartphones have become the standard personal device to store private or sensitive
information. Widely used as every day gadget, however, they are susceptible to get lost or …
information. Widely used as every day gadget, however, they are susceptible to get lost or …
Attention-aware dual-stream network for multimodal face anti-spoofing
Since the rapid development of face recognition systems using 3D cameras, the public has
demanded great safety regulations for these devices. As a closely related topic, multimodal …
demanded great safety regulations for these devices. As a closely related topic, multimodal …
Face flashing: a secure liveness detection protocol based on light reflections
Face authentication systems are becoming increasingly prevalent, especially with the rapid
development of Deep Learning technologies. However, human facial information is easy to …
development of Deep Learning technologies. However, human facial information is easy to …
On the Impact of Touch {ID} on {iPhone} Passcodes
Smartphones today store large amounts of data that can be confidential, private or sensitive.
To protect such data, all mobile OSs have a phone lock mechanism, a mechanism that …
To protect such data, all mobile OSs have a phone lock mechanism, a mechanism that …
A survey of mobile face biometrics
Face biometrics have attracted significant attention as a technology for secure access to
mobile devices. This is because almost all smartphones have RGB cameras suitable for …
mobile devices. This is because almost all smartphones have RGB cameras suitable for …
Light can hack your face! black-box backdoor attack on face recognition systems
Deep neural networks (DNN) have shown great success in many computer vision
applications. However, they are also known to be susceptible to backdoor attacks. When …
applications. However, they are also known to be susceptible to backdoor attacks. When …
Seeing your face is not enough: An inertial sensor-based liveness detection for face authentication
Leveraging built-in cameras on smartphones and tablets, face authentication provides an
attractive alternative of legacy passwords due to its memory-less authentication process …
attractive alternative of legacy passwords due to its memory-less authentication process …