Journal articles on the topic 'Spoof Detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Spoof Detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mittal, Abhishek, Pravneet Kaur, and Dr Ashish Oberoi. "Hybrid Algorithm for Face Spoof Detection." International Journal for Research in Applied Science and Engineering Technology 10, no. 2 (February 28, 2022): 1028–37. http://dx.doi.org/10.22214/ijraset.2022.40452.
Full textSingh, Km Priyanka, Dr Pushpneel Verma, and Ajay Singh. "Technique of Face Spoof Detection using Neural Network." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 1435–38. http://dx.doi.org/10.22214/ijraset.2022.46847.
Full textF.W. Onifade, Olufade, Paul Akinde, and Folasade Olubusola Isinkaye. "Circular Gabor wavelet algorithm for fingerprint liveness detection." Journal of Advanced Computer Science & Technology 9, no. 1 (January 11, 2020): 1. http://dx.doi.org/10.14419/jacst.v9i1.29908.
Full textMittal, Abhishek. "Hybrid Classification for Face Spoof Detection." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (November 30, 2021): 1732–39. http://dx.doi.org/10.22214/ijraset.2021.39085.
Full textArunalatha, G., and M. Ezhilarasan. "Fingerprint Spoof Detection Using Quality Features." International Journal of Security and Its Applications 9, no. 10 (October 31, 2015): 83–94. http://dx.doi.org/10.14257/ijsia.2015.9.10.07.
Full textVerma, Akhilesh, Vijay Kumar Gupta, Savita Goel, Akbar, Arun Kumar Yadav, and Divakar Yadav. "Modeling Fingerprint Presentation Attack Detection Through Transient Liveness Factor-A Person Specific Approach." Traitement du Signal 38, no. 2 (April 30, 2021): 299–307. http://dx.doi.org/10.18280/ts.380206.
Full textSuvarchala, P. V. L., and S. Srinivas Kumar. "Feature Set Fusion for Spoof Iris Detection." Engineering, Technology & Applied Science Research 8, no. 2 (April 19, 2018): 2859–63. http://dx.doi.org/10.48084/etasr.1859.
Full textKaur, Ramandeep, and P. S. "Techniques of Face Spoof Detection: A Review." International Journal of Computer Applications 164, no. 1 (April 17, 2017): 29–33. http://dx.doi.org/10.5120/ijca2017913569.
Full textBalamurali, K., S. Chandru, Muhammed Sohail Razvi, and V. Sathiesh Kumar. "Face Spoof Detection Using VGG-Face Architecture." Journal of Physics: Conference Series 1917, no. 1 (June 1, 2021): 012010. http://dx.doi.org/10.1088/1742-6596/1917/1/012010.
Full textDi Wen, Hu Han, and Anil K. Jain. "Face Spoof Detection With Image Distortion Analysis." IEEE Transactions on Information Forensics and Security 10, no. 4 (April 2015): 746–61. http://dx.doi.org/10.1109/tifs.2015.2400395.
Full textPatel, Keyurkumar, Hu Han, and Anil K. Jain. "Secure Face Unlock: Spoof Detection on Smartphones." IEEE Transactions on Information Forensics and Security 11, no. 10 (October 2016): 2268–83. http://dx.doi.org/10.1109/tifs.2016.2578288.
Full textBalaji, Aadhithya, Varun. H.S., and Sikha. O.K. "Multimodal Fingerprint Spoof Detection Using White Light." Procedia Computer Science 78 (2016): 330–35. http://dx.doi.org/10.1016/j.procs.2016.02.066.
Full textFarmanbar, Mina, and Önsen Toygar. "Spoof detection on face and palmprint biometrics." Signal, Image and Video Processing 11, no. 7 (March 25, 2017): 1253–60. http://dx.doi.org/10.1007/s11760-017-1082-y.
Full textRen, Yi, Jingjing Zhang, Xinxin Gao, Xin Zheng, Xinyu Liu, and Tie Jun Cui. "Active spoof plasmonics: from design to applications." Journal of Physics: Condensed Matter 34, no. 5 (November 11, 2021): 053002. http://dx.doi.org/10.1088/1361-648x/ac31f7.
Full textDave, Vani. "Spoof Detection Using Local Binary Pattern In Face." Jurnal Ilmu Komputer 13, no. 1 (April 29, 2020): 39. http://dx.doi.org/10.24843/jik.2020.v13.i01.p05.
Full textPatil, Pooja R., and Subhash S. Kulkarni. "Survey of non-intrusive face spoof detection methods." Multimedia Tools and Applications 80, no. 10 (January 28, 2021): 14693–721. http://dx.doi.org/10.1007/s11042-020-10338-1.
Full textRavindran, Swathika, and K. Geetha. "An Overview of Spoof Detection in ASV Systems." ECS Transactions 107, no. 1 (April 24, 2022): 1963–71. http://dx.doi.org/10.1149/10701.1963ecst.
Full textJiang, Yujia, and Xin Liu. "Spoof Fingerprint Detection based on Co-occurrence Matrix." International Journal of Signal Processing, Image Processing and Pattern Recognition 8, no. 8 (August 31, 2015): 373–84. http://dx.doi.org/10.14257/ijsip.2015.8.8.38.
Full textKho, Jun Beom, Wonjune Lee, Heeseung Choi, and Jaihie Kim. "An incremental learning method for spoof fingerprint detection." Expert Systems with Applications 116 (February 2019): 52–64. http://dx.doi.org/10.1016/j.eswa.2018.08.055.
Full textBabikir Adam, Edriss Eisa, and Sathesh. "Evaluation of Fingerprint Liveness Detection by Machine Learning Approach - A Systematic View." Journal of ISMAC 3, no. 1 (March 1, 2021): 16–30. http://dx.doi.org/10.36548/jismac.2021.1.002.
Full textHuszár, Viktor Dénes, and Vamsi Kiran Adhikarla. "Live Spoofing Detection for Automatic Human Activity Recognition Applications." Sensors 21, no. 21 (November 4, 2021): 7339. http://dx.doi.org/10.3390/s21217339.
Full textHassani, Ali, Jon Diedrich, and Hafiz Malik. "Monocular Facial Presentation–Attack–Detection: Classifying Near-Infrared Reflectance Patterns." Applied Sciences 13, no. 3 (February 3, 2023): 1987. http://dx.doi.org/10.3390/app13031987.
Full textAlshareef, Norah, Xiaohong Yuan, Kaushik Roy, and Mustafa Atay. "A Study of Gender Bias in Face Presentation Attack and Its Mitigation." Future Internet 13, no. 9 (September 14, 2021): 234. http://dx.doi.org/10.3390/fi13090234.
Full textAkhtar, Zahid, and Gian Luca Foresti. "Face Spoof Attack Recognition Using Discriminative Image Patches." Journal of Electrical and Computer Engineering 2016 (2016): 1–14. http://dx.doi.org/10.1155/2016/4721849.
Full textAgarwal, Rohit, A. S. Jalal, and K. V. Arya. "A review on presentation attack detection system for fake fingerprint." Modern Physics Letters B 34, no. 05 (February 3, 2020): 2030001. http://dx.doi.org/10.1142/s021798492030001x.
Full textNIKAM, SHANKAR BHAUSAHEB, and SUNEETA AGARWAL. "CO-OCCURRENCE PROBABILITIES AND WAVELET-BASED SPOOF FINGERPRINT DETECTION." International Journal of Image and Graphics 09, no. 02 (April 2009): 171–99. http://dx.doi.org/10.1142/s0219467809003393.
Full textRattani, Ajita, Walter J. Scheirer, and Arun Ross. "Open Set Fingerprint Spoof Detection Across Novel Fabrication Materials." IEEE Transactions on Information Forensics and Security 10, no. 11 (November 2015): 2447–60. http://dx.doi.org/10.1109/tifs.2015.2464772.
Full textDarlow, Luke Nicholas, Leandra Webb, and Natasha Botha. "Automated spoof-detection for fingerprints using optical coherence tomography." Applied Optics 55, no. 13 (April 22, 2016): 3387. http://dx.doi.org/10.1364/ao.55.003387.
Full textFei, Jianwei, Chengsheng Yuan, Qiang Zhang, Zhihua Xia, and Fei Gu. "Face spoof detection using feature map superposition and CNN." International Journal of Computational Science and Engineering 22, no. 2/3 (2020): 355. http://dx.doi.org/10.1504/ijcse.2020.10029396.
Full textGu, Fei, Zhihua Xia, Jianwei Fei, Chengsheng Yuan, and Qiang Zhang. "Face spoof detection using feature map superposition and CNN." International Journal of Computational Science and Engineering 22, no. 2/3 (2020): 355. http://dx.doi.org/10.1504/ijcse.2020.107356.
Full textNikam, Shankar Bhausaheb, and Suneeta Agarwal. "Local binary pattern and wavelet-based spoof fingerprint detection." International Journal of Biometrics 1, no. 2 (2008): 141. http://dx.doi.org/10.1504/ijbm.2008.020141.
Full textPereira, L. F. A., H. N. B. Pinheiro, G. D. C. Cavalcanti, and Tsang Ing Ren. "Spatial surface coarseness analysis: technique for fingerprint spoof detection." Electronics Letters 49, no. 4 (February 2013): 260–61. http://dx.doi.org/10.1049/el.2012.4173.
Full textJagdale, Prasad A., and Sudeep D. Thepade. "Face Liveness Detection using Feature Fusion Using Block Truncation Code Technique." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 8 (August 26, 2019): 19–22. http://dx.doi.org/10.17762/ijritcc.v7i8.5348.
Full textIsaack Adidas Kamanga and Johanson Miserigodiasi Lyimo. "Anti-spoofing detection based on eyeblink liveness testing for iris recognition." International Journal of Science and Research Archive 7, no. 1 (September 30, 2022): 053–67. http://dx.doi.org/10.30574/ijsra.2022.7.1.0186.
Full textKusuma, Indra Bayu, Arida Kartika, Tjokorda Agung Budi W, Kurniawan Nur Ramadhani, and Febryanti Sthevanie. "Image Spoofing Detection Using Local Binary Pattern and Local Binary Pattern Variance." International Journal on Information and Communication Technology (IJoICT) 4, no. 2 (April 2, 2019): 11. http://dx.doi.org/10.21108/ijoict.2018.42.134.
Full textKim, Seung-Hyun, Su-Min Jeon, and Eui Chul Lee. "Face Biometric Spoof Detection Method Using a Remote Photoplethysmography Signal." Sensors 22, no. 8 (April 16, 2022): 3070. http://dx.doi.org/10.3390/s22083070.
Full textNguyen, Dat Tien, Hyo Sik Yoon, Tuyen Danh Pham, and Kang Ryoung Park. "Spoof Detection for Finger-Vein Recognition System Using NIR Camera." Sensors 17, no. 10 (October 1, 2017): 2261. http://dx.doi.org/10.3390/s17102261.
Full textLiang, Yuxin, Chaoqun Hong, and Weiwei Zhuang. "Face Spoof Attack Detection with Hypergraph Capsule Convolutional Neural Networks." International Journal of Computational Intelligence Systems 14, no. 1 (2021): 1396. http://dx.doi.org/10.2991/ijcis.d.210419.003.
Full textPujol, Francisco A., María José Pujol, Carlos Rizo-Maestre, and Mar Pujol. "Entropy-Based Face Recognition and Spoof Detection for Security Applications." Sustainability 12, no. 1 (December 20, 2019): 85. http://dx.doi.org/10.3390/su12010085.
Full textKamble, Madhu R., and Hemant A. Patil. "Detection of replay spoof speech using teager energy feature cues." Computer Speech & Language 65 (January 2021): 101140. http://dx.doi.org/10.1016/j.csl.2020.101140.
Full textChintha, Akash, Bao Thai, Saniat Javid Sohrawardi, Kartavya Bhatt, Andrea Hickerson, Matthew Wright, and Raymond Ptucha. "Recurrent Convolutional Structures for Audio Spoof and Video Deepfake Detection." IEEE Journal of Selected Topics in Signal Processing 14, no. 5 (August 2020): 1024–37. http://dx.doi.org/10.1109/jstsp.2020.2999185.
Full textArti, Yuni, and Aniati Murni Arymurthy. "Face Spoofing Detection using Inception-v3 on RGB Modal and Depth Modal." Jurnal Ilmu Komputer dan Informasi 16, no. 1 (March 1, 2023): 47–57. http://dx.doi.org/10.21609/jiki.v16i1.1100.
Full textRahman, Md Mustafejur, Md Mustafizur Rahman, Saif Ibne Reza, Sumonto Sarker, and Md Mehedi Islam. "Proposed an Algorithm for Preventing IP Spoofing DoS Attack on Neighbor Discovery Protocol of IPv6 in Link Local Network." European Journal of Engineering Research and Science 4, no. 12 (December 17, 2019): 65–70. http://dx.doi.org/10.24018/ejers.2019.4.12.1644.
Full textRahman, Md Mustafejur, Md Mustafizur Rahman, Saif Ibne Reza, Sumonto Sarker, and Md Mehedi Islam. "Proposed an Algorithm for Preventing IP Spoofing DoS Attack on Neighbor Discovery Protocol of IPv6 in Link Local Network." European Journal of Engineering and Technology Research 4, no. 12 (December 17, 2019): 65–70. http://dx.doi.org/10.24018/ejeng.2019.4.12.1644.
Full textAnand, Diksha, and Kamal Gupta. "Face Spoof Detection System Based on Genetic Algorithm and Artificial Intelligence Technique: A Review." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 6 (June 30, 2018): 51. http://dx.doi.org/10.23956/ijarcsse.v8i6.722.
Full textAgarwal, Shivang, Ajita Rattani, and C. Ravindranath Chowdary. "A-iLearn: An adaptive incremental learning model for spoof fingerprint detection." Machine Learning with Applications 7 (March 2022): 100210. http://dx.doi.org/10.1016/j.mlwa.2021.100210.
Full textJia, Xiaofei, Xin Yang, Kai Cao, Yali Zang, Ning Zhang, Ruwei Dai, Xinzhong Zhu, and Jie Tian. "Multi-scale local binary pattern with filters for spoof fingerprint detection." Information Sciences 268 (June 2014): 91–102. http://dx.doi.org/10.1016/j.ins.2013.06.041.
Full textShiaeles, S. N., and M. Papadaki. "FHSD: An Improved IP Spoof Detection Method for Web DDoS Attacks." Computer Journal 58, no. 4 (February 21, 2014): 892–903. http://dx.doi.org/10.1093/comjnl/bxu007.
Full textPapini, Davide. "Lightweight MAC-spoof detection exploiting received signal power and median filtering." International Journal of Critical Computer-Based Systems 3, no. 4 (2012): 247. http://dx.doi.org/10.1504/ijccbs.2012.053204.
Full textChadha, Ankita, Azween Abdullah, and Lorita Angeline. "An improved normalized gain-based score normalization technique for spoof detection algorithm." International journal of electrical and computer engineering systems 13, no. 6 (September 1, 2022): 457–65. http://dx.doi.org/10.32985/ijeces.13.6.5.
Full text