cortisol
发表于 2025-3-23 10:18:11
Ralf Huss. This unique and timely volume is designed for researchers and advanced-level students in computer science. It is also suitable for Biometric and Computer Security professionals..978-1-4419-4375-0978-0-387-71041-9
碎石头
发表于 2025-3-23 15:58:01
http://reply.papertrans.cn/55/5462/546102/546102_12.png
平静生活
发表于 2025-3-23 18:29:28
http://reply.papertrans.cn/55/5462/546102/546102_13.png
表脸
发表于 2025-3-23 23:33:29
http://reply.papertrans.cn/55/5462/546102/546102_14.png
我不重要
发表于 2025-3-24 04:20:12
http://reply.papertrans.cn/55/5462/546102/546102_15.png
奖牌
发表于 2025-3-24 08:10:59
http://reply.papertrans.cn/55/5462/546102/546102_16.png
mucous-membrane
发表于 2025-3-24 14:37:55
Ralf Hussof presentation attack species (i.e., artifacts), varying from low-cost artifacts to sophisticated materials. A number of presentation attack detection (PAD) approaches have been specifically designed to detect and counteract presentation attacks on fingerprint systems. In this chapter, we study and
Resistance
发表于 2025-3-24 14:57:36
Ralf HussThis chapter examines the effects of two different spoofing attacks against two different gait recognition systems. The first attack uses . where an attacker replicates the clothing of a legitimately enrolled individual. The second attack is a . where an imposter deliberately selects the legitimatel
Priapism
发表于 2025-3-24 22:58:24
http://reply.papertrans.cn/55/5462/546102/546102_19.png
珊瑚
发表于 2025-3-25 01:52:48
Ralf Husslly adopt behavioral challenge-response or texture analysis methods to resist spoofing attacks, however, these methods require high user cooperation and are sensitive to the imaging quality and environments. In this chapter, we present a multi-spectral face recognition system working in VIS (Visible