Laser & Optoelectronics Progress, Volume. 56, Issue 3, 031002(2019)
3D Printing Mask Attacks Detection Based on Multi-Feature Fusion
[2] Nixon K A, Aimale V, Rowe R K. Spoof detection schemes[M]. ∥Boston: Springer US, 403-423(2008).
[3] Chetty G, Wagner M. Multi-level liveness verification for face-voice biometric authentication. [C]∥Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference, 1-6(2006).
[4] Pan G, Sun L, Wu Z H et al. Eyeblink-based anti-spoofing in face recognition from a generic webcamera. [C]∥IEEE 11th International Conference on Computer Vision, 1-8(2007).
[5] Kollreider K, Fronthaler H, Bigun J. Evaluating liveness by face images and the structure tensor. [C]//Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05), 75-80(2005).
[6] de Marsico M, Nappi M, Riccio D et al. . Moving face spoofing detection via 3D projective invariants. [C]∥2012 5th IAPR International Conference on Biometrics (ICB), 73-78(2012).
[8] Määttä J, Hadid A, Pietikäinen M. Face spoofing detection from single images using micro-texture analysis. [C]∥International Joint Conference on Biometrics (IJCB), 1-7(2011).
[10] Wallace R. McLaren M, McCool C, et al. Inter-session variability modelling and joint factor analysis for face authentication. [C]∥International Joint Conference on Biometrics (IJCB), 1-8(2011).
[11] Erdogmus N, Marcel S. Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect. [C]∥IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), 1-6(2013).
[13] Zhang Z W, Yi D, Lei Z et al. Face liveness detection by learning multispectral reflectance distributions. [C]∥Face and Gesture, 436-441(2011).
[14] Kose N, Dugelay J L. Countermeasure for the protection of face recognition systems against mask attacks. [C]∥10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), 1-6(2013).
[16] Agarwal A, Singh R, Vatsa M. Face anti-spoofing using Haralick features. [C]∥IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), 1-6(2016).
[18] Sun X, Morvan J M. Curvature measures, normal cycles and asymptotic cones[J]. Actes des Rencontres Du CIRM, 3, 3-10(2013).
[20] Cohen-Steiner D, Morvan J M. Restricted delaunay triangulations and normal cycle. [C]∥Proceedings of the nineteenth Conference on Computational Geometry - SCG '03, the Nineteenth Conference(2003).
Get Citation
Copy Citation Text
Jingwei Lu, Hetian Chen, Xiaopan Ma, Jimin Chen. 3D Printing Mask Attacks Detection Based on Multi-Feature Fusion[J]. Laser & Optoelectronics Progress, 2019, 56(3): 031002
Category: Image Processing
Received: Jul. 4, 2018
Accepted: Aug. 13, 2018
Published Online: Jul. 31, 2019
The Author Email: Jingwei Lu (18810815230@126.com)