cortisol 发表于 2025-3-23 10:18:11
Ralf Huss. This unique and timely volume is designed for researchers and advanced-level students in computer science. It is also suitable for Biometric and Computer Security professionals..978-1-4419-4375-0978-0-387-71041-9碎石头 发表于 2025-3-23 15:58:01
http://reply.papertrans.cn/55/5462/546102/546102_12.png平静生活 发表于 2025-3-23 18:29:28
http://reply.papertrans.cn/55/5462/546102/546102_13.png表脸 发表于 2025-3-23 23:33:29
http://reply.papertrans.cn/55/5462/546102/546102_14.png我不重要 发表于 2025-3-24 04:20:12
http://reply.papertrans.cn/55/5462/546102/546102_15.png奖牌 发表于 2025-3-24 08:10:59
http://reply.papertrans.cn/55/5462/546102/546102_16.pngmucous-membrane 发表于 2025-3-24 14:37:55
Ralf Hussof presentation attack species (i.e., artifacts), varying from low-cost artifacts to sophisticated materials. A number of presentation attack detection (PAD) approaches have been specifically designed to detect and counteract presentation attacks on fingerprint systems. In this chapter, we study andResistance 发表于 2025-3-24 14:57:36
Ralf HussThis chapter examines the effects of two different spoofing attacks against two different gait recognition systems. The first attack uses . where an attacker replicates the clothing of a legitimately enrolled individual. The second attack is a . where an imposter deliberately selects the legitimatelPriapism 发表于 2025-3-24 22:58:24
http://reply.papertrans.cn/55/5462/546102/546102_19.png珊瑚 发表于 2025-3-25 01:52:48
Ralf Husslly adopt behavioral challenge-response or texture analysis methods to resist spoofing attacks, however, these methods require high user cooperation and are sensitive to the imaging quality and environments. In this chapter, we present a multi-spectral face recognition system working in VIS (Visible