FER 发表于 2025-3-25 04:54:57
http://reply.papertrans.cn/43/4210/420909/420909_21.pngHeterodoxy 发表于 2025-3-25 10:06:09
Multimodal Anti-spoofing in Biometric Recognition Systems,ded clear evidence that they can be evaded by spoofing a single biometric trait. This pointed out that also multimodal systems require specific anti-spoofing measures. In this chapter, we introduce the issue of multimodal anti-spoofing, and give an overview of state-of-the-art anti-spoofing measures朴素 发表于 2025-3-25 15:15:28
Evaluation Methodologies,y classification systems. The two classes that they differentiate are genuine accesses and spoofing attacks. From this perspective, their evaluation is equivalent to the established evaluation standards for the binary classification systems. However, the anti-spoofing systems are designed to operate腐败 发表于 2025-3-25 19:29:41
http://reply.papertrans.cn/43/4210/420909/420909_24.png松软无力 发表于 2025-3-25 20:03:20
http://reply.papertrans.cn/43/4210/420909/420909_25.pngfilicide 发表于 2025-3-26 02:49:52
http://reply.papertrans.cn/43/4210/420909/420909_26.pngCREEK 发表于 2025-3-26 05:39:48
https://doi.org/10.1007/978-3-031-12455-6s that have been reached in this field over the last decade. In addition, after a comprehensive review of the available literature in the field, we explore the potential of quality assessment as a way to enhance the security of the fingerprint-based technology against direct attacks. We believe thatSLING 发表于 2025-3-26 10:37:42
https://doi.org/10.1007/978-4-431-45978-1o use and less human-invasive. Unfortunately, recent work revealed that face biometrics is quite vulnerable to spoofing attacks. This chapter presents the different modalities of attacks to visual spectrum face recognition systems. We introduce public datasets for the evaluation of vulnerability ofHAWK 发表于 2025-3-26 14:49:12
http://reply.papertrans.cn/43/4210/420909/420909_29.pngBARB 发表于 2025-3-26 19:34:34
http://reply.papertrans.cn/43/4210/420909/420909_30.png