The role of muscle synergies in myoelectric control: trends and challenges for simultaneous multifunction control
Myoelectric control is filled with potential to significantly change human–robot interaction
due to the ability to non-invasively measure human motion intent. However, current control …
due to the ability to non-invasively measure human motion intent. However, current control …
Spoofing face recognition with 3D masks
Spoofing is the act of masquerading as a valid user by falsifying data to gain an illegitimate
access. Vulnerability of recognition systems to spoofing attacks (presentation attacks) is still …
access. Vulnerability of recognition systems to spoofing attacks (presentation attacks) is still …
Spoofing in 2d face recognition with 3d masks and anti-spoofing with kinect
The problem of detecting face spoofing attacks (presentation attacks) has recently gained a
well-deserved popularity. Mainly focusing on 2D attacks forged by displaying printed photos …
well-deserved popularity. Mainly focusing on 2D attacks forged by displaying printed photos …
Audio-visual biometric recognition and presentation attack detection: A comprehensive survey
Biometric recognition is a trending technology that uses unique characteristics data to
identify or verify/authenticate security applications. Amidst the classically used biometrics …
identify or verify/authenticate security applications. Amidst the classically used biometrics …
Are GAN-based morphs threatening face recognition?
Morphing attacks are a threat to biometric systems where the biometric reference in an
identity document can be altered. This form of attack presents an important issue in …
identity document can be altered. This form of attack presents an important issue in …
Face recognition systems under spoofing attacks
In this chapter, we give an overview of spoofing attacks and spoofing countermeasures for
face recognition systems, with a focus on visual spectrum systems (VIS) in 2D and 3D, as …
face recognition systems, with a focus on visual spectrum systems (VIS) in 2D and 3D, as …
Biometrics evaluation under spoofing attacks
While more accurate and reliable than ever, the trustworthiness of biometric verification
systems is compromised by the emergence of spoofing attacks. Responding to this threat …
systems is compromised by the emergence of spoofing attacks. Responding to this threat …
Vulnerability analysis of face morphing attacks from landmarks and generative adversarial networks
Morphing attacks is a threat to biometric systems where the biometric reference in an identity
document can be altered. This form of attack presents an important issue in applications …
document can be altered. This form of attack presents an important issue in applications …
Continuously reproducing toolchains in pattern recognition and machine learning experiments
Pattern recognition and machine learning research work often contains experimental results
on real-world data, which corroborates hypotheses and provides a canvas for the …
on real-world data, which corroborates hypotheses and provides a canvas for the …
Deeply vulnerable: a study of the robustness of face recognition to presentation attacks
The vulnerability of deep‐learning‐based face‐recognition (FR) methods, to presentation
attacks (PA), is studied in this study. Recently, proposed FR methods based on deep neural …
attacks (PA), is studied in this study. Recently, proposed FR methods based on deep neural …