Littérature scientifique sur le sujet « Spoof Detection »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Spoof Detection ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Spoof Detection"

1

Mittal, Abhishek, Pravneet Kaur et Dr Ashish Oberoi. « Hybrid Algorithm for Face Spoof Detection ». International Journal for Research in Applied Science and Engineering Technology 10, no 2 (28 février 2022) : 1028–37. http://dx.doi.org/10.22214/ijraset.2022.40452.

Texte intégral
Résumé :
Abstract: The face spoof detection is the approach which can detect spoofed face. The face spoof detection methods has various phases which include pre-processing, feature extraction and classification. The classification algorithm can classify into two classes which are spoofed or not spoofed. The KNN approach is used previously with the GLCM algorithm for the face spoof detection which give low accuracy. In this research work, the hybrid classification method is proposed which is the combination of random forest, k nearest neighbour and SVM Classifiers. The simulation outcomes depict that the introduced method performs more efficiently in comparison with the conventional techniques with regard to accuracy. Keywords: Face Spoof, KNN, Hybrid Classifier, GLCM
Styles APA, Harvard, Vancouver, ISO, etc.
2

Singh, Km Priyanka, Dr Pushpneel Verma et Ajay Singh. « Technique of Face Spoof Detection using Neural Network ». International Journal for Research in Applied Science and Engineering Technology 10, no 9 (30 septembre 2022) : 1435–38. http://dx.doi.org/10.22214/ijraset.2022.46847.

Texte intégral
Résumé :
Abstract: Face detection is one in every of the foremost relevent application of image processing and biometric system. Artificial neural networks (ANN) are utilized in the sphere of image processing and pattern recognition. For the recognition and detection of spoofed and non-spoofed images, face spoof approach was proposed. Earlier presented support vector machine classification model is used for the detection of spoofed or non-spoofed images. within the earlier research, SVM based approach was proposed to detect the face spoof. The face spoof detection approaches involves two stages. The initial stage includes feature extraction and second stage includes classification. The features are extracted using Eigen based system. The classification is performed through SVM classifier. within the proposed approach, the KNN classifier is used in place of SVM classifier for improving the accuracy of the face spoof discovery. The performance of the proposed algorithm and also the earlier algorithm is analyzed through some comparisons among them in terms of precision and execution time.
Styles APA, Harvard, Vancouver, ISO, etc.
3

F.W. Onifade, Olufade, Paul Akinde et Folasade Olubusola Isinkaye. « Circular Gabor wavelet algorithm for fingerprint liveness detection ». Journal of Advanced Computer Science & ; Technology 9, no 1 (11 janvier 2020) : 1. http://dx.doi.org/10.14419/jacst.v9i1.29908.

Texte intégral
Résumé :
Biometrics usage is growing daily and fingerprint-based recognition system is among the most effective and popular methods of personality identification. The conventional fingerprint sensor functions on total internal reflectance (TIR), which is a method that captures the external features of the finger that is presented to it. Hence, this opens it up to spoof attacks. Liveness detection is an anti-spoofing approach that has the potentials to identify physiological features in fingerprints. It has been demonstrated that spoof fingerprint made of gelatin, gummy and play-doh can easily deceive sensor. Therefore, the security of such sensor is not guaranteed. Here, we established a secure and robust fake-spoof fingerprint identification algorithm using Circular Gabor Wavelet for texture segmentation of the captured images. The samples were exposed to feature extraction processing using circular Gabor wavelet algorithm developed for texture segmentations. The result was evaluated using FAR which measures if a user presented is accepted under a false claimed identity. The FAR result was 0.03125 with an accuracy of 99.968% which showed distinct difference between live and spoof fingerprint.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Mittal, Abhishek. « Hybrid Classification for Face Spoof Detection ». International Journal for Research in Applied Science and Engineering Technology 9, no 11 (30 novembre 2021) : 1732–39. http://dx.doi.org/10.22214/ijraset.2021.39085.

Texte intégral
Résumé :
Abstract: ML (machine learning) is consisted of a method of recognizing face. This technique is useful for the attendance system. Two sets are generated for testing and training phases in order to segment the image, to extract the features and develop a dataset. An image is considered as a testing set; the training set is contrasted when it is essential to identify an image. An ensemble classifier is implemented to classify the test images as recognized or non-recognized. The ensemble algorithm fails to acquire higher accuracy as it classifies the data in two classes. Thus, GLCM (Grey Level Co-occurrence Matrix) is projected for analyzing the texture features in order to detect the face. The attendance of the query image is marked after detecting the face. The simulation outcomes revealed the superiority of the projected technique over the traditional methods concerning accuracy. Keywords: DWT, GLCM, KNN, Decision Tree
Styles APA, Harvard, Vancouver, ISO, etc.
5

Arunalatha, G., et M. Ezhilarasan. « Fingerprint Spoof Detection Using Quality Features ». International Journal of Security and Its Applications 9, no 10 (31 octobre 2015) : 83–94. http://dx.doi.org/10.14257/ijsia.2015.9.10.07.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Verma, Akhilesh, Vijay Kumar Gupta, Savita Goel, Akbar, Arun Kumar Yadav et Divakar Yadav. « Modeling Fingerprint Presentation Attack Detection Through Transient Liveness Factor-A Person Specific Approach ». Traitement du Signal 38, no 2 (30 avril 2021) : 299–307. http://dx.doi.org/10.18280/ts.380206.

Texte intégral
Résumé :
A self-learning, secure and independent open-set solution is essential to be explored to characterise the liveness of fingerprint presentation. Fingerprint spoof presentation classified as live (a Type-I error) is a major problem in a high-security establishment. Type-I error are manifestation of small number of spoof sample. We propose to use only live sample to overcome above challenge. We put forward an adaptive ‘fingerprint presentation attack detection’ (FPAD) scheme using interpretation of live sample. It requires initial high-quality live fingerprint sample of the concerned person. It uses six different image quality metrics as a transient attribute from each live sample and record it as ‘Transient Liveness Factor’ (TLF). Our study also proposes to apply fusion rule to validate scheme with three outlier detection algorithms, one-class support vector machine (SVM), isolation forest and local outlier factor. Proposed study got phenomenal accuracy of 100% in terms of spoof detection, which is an open-set method. Further, this study proposes and discuss open issues on person specific spoof detection on cloud-based solutions.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Suvarchala, P. V. L., et S. Srinivas Kumar. « Feature Set Fusion for Spoof Iris Detection ». Engineering, Technology & ; Applied Science Research 8, no 2 (19 avril 2018) : 2859–63. http://dx.doi.org/10.48084/etasr.1859.

Texte intégral
Résumé :
Iris recognition is considered as one of the most promising noninvasive biometric systems providing automated human identification. Numerous programs, like unique ID program in India - Aadhar, include iris biometric to provide distinctive identity identification to citizens. The active area is usually captured under non ideal imaging conditions. It usually suffers from poor brightness, low contrast, blur due to camera or subject's relative movement and eyelid eyelash occlusions. Besides the technical challenges, iris recognition started facing sophisticated threats like spoof attacks. Therefore it is vital that the integrity of such large scale iris deployments must be preserved. This paper presents the development of a new spoof resistant approach which exploits the statistical dependencies of both general eye and localized iris regions in textural domain using spatial gray level dependence matrix (SGLDM), gray level run length matrix (GLRLM) and contourlets in transform domain. We did experiments on publicly available fake and lens iris image databases. Correct classification rate obtained with ATVS-FIr iris database is 100% while it is 95.63% and 88.83% with IITD spoof iris databases respectively.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Kaur, Ramandeep, et P. S. « Techniques of Face Spoof Detection : A Review ». International Journal of Computer Applications 164, no 1 (17 avril 2017) : 29–33. http://dx.doi.org/10.5120/ijca2017913569.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Balamurali, K., S. Chandru, Muhammed Sohail Razvi et V. Sathiesh Kumar. « Face Spoof Detection Using VGG-Face Architecture ». Journal of Physics : Conference Series 1917, no 1 (1 juin 2021) : 012010. http://dx.doi.org/10.1088/1742-6596/1917/1/012010.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Di Wen, Hu Han et Anil K. Jain. « Face Spoof Detection With Image Distortion Analysis ». IEEE Transactions on Information Forensics and Security 10, no 4 (avril 2015) : 746–61. http://dx.doi.org/10.1109/tifs.2015.2400395.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "Spoof Detection"

1

TOOSI, AMIRHOSEIN. « Feature Fusion for Fingerprint Liveness Detection ». Doctoral thesis, Politecnico di Torino, 2018. http://hdl.handle.net/11583/2711594.

Texte intégral
Résumé :
For decades, fingerprints have been the most widely used biometric trait in identity recognition systems, thanks to their natural uniqueness, even in rare cases such as identical twins. Recently, we witnessed a growth in the use of fingerprint-based recognition systems in a large variety of devices and applications. This, as a consequence, increased the benefits for offenders capable of attacking these systems. One of the main issues with the current fingerprint authentication systems is that, even though they are quite accurate in terms of identity verification, they can be easily spoofed by presenting to the input sensor an artificial replica of the fingertip skin’s ridge-valley patterns. Due to the criticality of this threat, it is crucial to develop countermeasure methods capable of facing and preventing these kind of attacks. The most effective counter–spoofing methods are those trying to distinguish between a "live" and a "fake" fingerprint before it is actually submitted to the recognition system. According to the technology used, these methods are mainly divided into hardware and software-based systems. Hardware-based methods rely on extra sensors to gain more pieces of information regarding the vitality of the fingerprint owner. On the contrary, software-based methods merely rely on analyzing the fingerprint images acquired by the scanner. Software-based methods can then be further divided into dynamic, aimed at analyzing sequences of images to capture those vital signs typical of a real fingerprint, and static, which process a single fingerprint impression. Among these different approaches, static software-based methods come with three main benefits. First, they are cheaper, since they do not require the deployment of any additional sensor to perform liveness detection. Second, they are faster since the information they require is extracted from the same input image acquired for the identification task. Third, they are potentially capable of tackling novel forms of attack through an update of the software. The interest in this type of counter–spoofing methods is at the basis of this dissertation, which addresses the fingerprint liveness detection under a peculiar perspective, which stems from the following consideration. Generally speaking, this problem has been tackled in the literature with many different approaches. Most of them are based on first identifying the most suitable image features for the problem in analysis and, then, into developing some classification system based on them. In particular, most of the published methods rely on a single type of feature to perform this task. Each of this individual features can be more or less discriminative and often highlights some peculiar characteristics of the data in analysis, often complementary with that of other feature. Thus, one possible idea to improve the classification accuracy is to find effective ways to combine them, in order to mutually exploit their individual strengths and soften, at the same time, their weakness. However, such a "multi-view" approach has been relatively overlooked in the literature. Based on the latter observation, the first part of this work attempts to investigate proper feature fusion methods capable of improving the generalization and robustness of fingerprint liveness detection systems and enhance their classification strength. Then, in the second part, it approaches the feature fusion method in a different way, that is by first dividing the fingerprint image into smaller parts, then extracting an evidence about the liveness of each of these patches and, finally, combining all these pieces of information in order to take the final classification decision. The different approaches have been thoroughly analyzed and assessed by comparing their results (on a large number of datasets and using the same experimental protocol) with that of other works in the literature. The experimental results discussed in this dissertation show that the proposed approaches are capable of obtaining state–of–the–art results, thus demonstrating their effectiveness.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Pedersen, Øystein Aas. « Detecting Wireless Identity Spoofs in Urban Settings, Based on Received Signal Strength Measurements ». Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-11127.

Texte intégral
Résumé :
The most common gateway for executing attacks in 802.11 networks are the MACspoofing attack. Current Todays Wireless IDS implements different methods todetect MAC spoofing, but are particularly interested in using methods that arebased on characteristics that are considered unspoofable. One such characteristicis the received signal strength (RSS). Current research are often tested in officeenvironments only, and this work aims to test how the methods work in WirelessTrondheim’s urban environment. To research the effects, a wireless sensor networkwas made. A framework for treating captured data from the sensor network wasdeveloped that can be augmented with various detection methods for 802.11 basednetworks. A RSS detection method has been developed and tested with real testdata from an urban environment. A RSS based detection method was tested, andthe results depicts the challenges of using such methods in an urban environment.Results also show that existing statistically based RSS methods would work poorlyin such environments.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Loffreno, Michele. « Computer Vision and Machine Learning for a Spoon-feeding Robot : A prototype solution based on ABB YuMi and an Intel RealSense camera ». Thesis, Umeå universitet, Institutionen för tillämpad fysik och elektronik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-182503.

Texte intégral
Résumé :
A lot of people worldwide are affected by limitations and disabilities that make it hard to do even essential actions and everyday tasks, such as eating. The impact of robotics on the lives of elder people or people having any kind of inability, which makes it hard everyday actions as to eat, was considered. The aim of this thesis is to study the implementation of a robotic system in order to achieve an automatic feeding process. Different kinds of robots and solutions were taken into account, for instance, the Obi and the prototype realized by the Washington University. The system considered uses an RGBD camera, an Intel RealSense D400 series camera, to detect pieces of cutlery and food on a table and a robotic arm, an ABB-YuMi, to pick up the identified objects. The spoon detection is based on the pre-trained convolutional neural network AlexNet provided by MATLAB. Two detectors were implemented. The first one can detect up to four different objects (spoon, plate, fork and knife), the second one can detect only spoon and plate. Different algorithms based on morphology were tested in order to compute the pose of the objects detected. RobotStudio was used to establish a connection between MATLAB and the robot. The goal was to make the whole process as automated as possible. The neural network trained on two objects reached 100% of accuracy during the training test. The detector based on it was tested on the real system. It was possible to detect the spoon and the plate and to draw a good centered boundary box. The accuracy reached can be considered satisfying since it has been possible to grasp a spoon using the YuMi based on a picture of the table. It was noticed that the lighting condition is the key factor to get a satisfying result or to miss the detection of the spoon. The best result was archived when the light is uniform and there are no reflections and shadows on the objects. The pictures which get a better result for the detection were taken in an apartment. Despite the limitations of the interface between MATLAB and the controller of the YuMi, a good level of automation was reached. The influence of lighting conditions in this setting was discussed and some practical suggestions and considerations were made.
No
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "Spoof Detection"

1

Spook : A "nameless detective" novel. New York : Carroll & Graf Publishers, 2003.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Spook : A "nameless detective" novel. Waterville, Me : Thorndike Press, 2003.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

The drowning spool. Waterville, Maine : Thorndike Press, 2014.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Perry, Anne. Long Spoon Lane. Waterville, Me : Large Print Press, 2005.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Perry, Anne. Long Spoon Lane. Waterville, Me : Thorndike Press, 2005.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Perry, Anne. Long Spoon Lane. London : Headline, 2005.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Perry, Anne. Long Spoon Lane : A novel. New York : Ballantine Books, 2005.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Simenon, Georges. Maigret en het spook. [Amsterdam etc.] : Pandora, 2003.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Perry, Anne. Long Spoon Lane : A novel / Anne Perry. New York : Ballantine Books, 2005.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Knights of the sea : A grim tale of murder, politics, and spoon addiction. Sackville, N.B : Sybertooth, 2010.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "Spoof Detection"

1

Franco, Annalisa, et Davide Maltoni. « Fingerprint Synthesis and Spoof Detection ». Dans Advances in Biometrics, 385–406. London : Springer London, 2008. http://dx.doi.org/10.1007/978-1-84628-921-7_20.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Abdullakutty, Faseela, Eyad Elyan et Pamela Johnston. « Face Spoof Detection : An Experimental Framework ». Dans Proceedings of the International Neural Networks Society, 293–304. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-80568-5_25.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Guo, Fanglu, et Tzi-cker Chiueh. « Sequence Number-Based MAC Address Spoof Detection ». Dans Lecture Notes in Computer Science, 309–29. Berlin, Heidelberg : Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11663812_16.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Das, Tandra Rani, Sharad Hasan, S. M. Sarwar, Jugal Krishna Das et Muhammad Arifur Rahman. « Facial Spoof Detection Using Support Vector Machine ». Dans Advances in Intelligent Systems and Computing, 615–25. Singapore : Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4673-4_50.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Eskandari, Maryam, et Omid Sharifi. « Designing Efficient Spoof Detection Scheme for Face Biometric ». Dans Lecture Notes in Computer Science, 427–34. Cham : Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94211-7_46.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

He, Zhaofeng, Zhenan Sun, Tieniu Tan et Zhuoshi Wei. « Efficient Iris Spoof Detection via Boosted Local Binary Patterns ». Dans Advances in Biometrics, 1080–90. Berlin, Heidelberg : Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01793-3_109.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Zheng, Mingchun, Shoubao Yang, Xianglan Piao et Weifeng Sun. « Research on ARP Spoof Detection Strategies in Unreliable LAN ». Dans Human Centered Computing, 216–25. Cham : Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15554-8_18.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Jang, Han-Ul, Hak-Yeol Choi, Dongkyu Kim, Jeongho Son et Heung-Kyu Lee. « Fingerprint Spoof Detection Using Contrast Enhancement and Convolutional Neural Networks ». Dans Information Science and Applications 2017, 331–38. Singapore : Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-4154-9_39.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Patil, Ankur T., Harsh Kotta, Rajul Acharya et Hemant A. Patil. « Spectral Root Features for Replay Spoof Detection in Voice Assistants ». Dans Speech and Computer, 504–15. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87802-3_46.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Zhou, Ye, Jianwu Zhang et Pengguo Zhang. « Spoof Speech Detection Based on Raw Cross-Dimension Interaction Attention Network ». Dans Biometric Recognition, 621–29. Cham : Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-20233-9_63.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Spoof Detection"

1

Swaszek, Peter F., Richard J. Hartnett et Kelly C. Seals. « APNT for GNSS Spoof Detection ». Dans 2017 International Technical Meeting of The Institute of Navigation. Institute of Navigation, 2017. http://dx.doi.org/10.33012/2017.14957.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Swaszek, Peter F., Richard J. Hartnett et Kelly C. Seals. « GNSS Spoof Detection Using Passive Ranging ». Dans 29th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS+ 2016). Institute of Navigation, 2016. http://dx.doi.org/10.33012/2016.14778.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Nixon, Kristin A., et Robert K. Rowe. « Multispectral fingerprint imaging for spoof detection ». Dans Defense and Security, sous la direction de Anil K. Jain et Nalini K. Ratha. SPIE, 2005. http://dx.doi.org/10.1117/12.606643.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Swaszek, Peter F., Richard J. Hartnett et Kelly C. Seals. « GNSS Spoof Detection using Independent Range Information ». Dans 2016 International Technical Meeting of The Institute of Navigation. Institute of Navigation, 2016. http://dx.doi.org/10.33012/2016.13457.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Wu, Lei, et Ye Jiang. « Attentional Fusion TDNN for Spoof Speech Detection ». Dans 2022 5th International Conference on Pattern Recognition and Artificial Intelligence (PRAI). IEEE, 2022. http://dx.doi.org/10.1109/prai55851.2022.9904136.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Patil, Neha D., et Sujata V. Kadam. « Face spoof detection techniques : IDA and PCA ». Dans 2016 Online International Conference on Green Engineering and Technologies (IC-GET). IEEE, 2016. http://dx.doi.org/10.1109/get.2016.7916823.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Tapkir, Prasad A., Madhu R. Kamble, Hemant A. Patil et Maulik Madhavi. « Replay Spoof Detection using Power Function Based Features ». Dans 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC). IEEE, 2018. http://dx.doi.org/10.23919/apsipa.2018.8659582.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Chugh, Tarang, et Anil K. Jain. « Fingerprint Spoof Detection : Temporal Analysis of Image Sequence ». Dans 2020 IEEE International Joint Conference on Biometrics (IJCB). IEEE, 2020. http://dx.doi.org/10.1109/ijcb48548.2020.9304921.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Anusha, B. V. S., Sayan Banerjee et Subhasis Chaudhuri. « DeFraudNet:End2End Fingerprint Spoof Detection using Patch Level Attention ». Dans 2020 IEEE Winter Conference on Applications of Computer Vision (WACV). IEEE, 2020. http://dx.doi.org/10.1109/wacv45572.2020.9093397.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Chugh, Tarang, Kai Cao et Anil K. Jain. « Fingerprint spoof detection using minutiae-based local patches ». Dans 2017 IEEE International Joint Conference on Biometrics (IJCB). IEEE, 2017. http://dx.doi.org/10.1109/btas.2017.8272745.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie