Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference81 articles.
1. Akhtar Z, Michelon C, Foresti G L (2014) Liveness detection for biometric authentication in mobile applications. In: 2014 International Carnahan conference on security technology (ICCST). IEEE, pp 1–6
2. Akhtar Z, Micheloni C, Piciarelli C, Foresti G L (2014) Mobio_livdet: mobile biometric liveness detection. In: 2014 11th IEEE international conference on advanced video and signal based surveillance (AVSS). IEEE, pp 187–192
3. Alotaibi A, Mahmood A (2016) Enhancing computer vision to detect face spoofing attack utilizing a single frame from a replay video attack using deep learning. In: 2016 International conference on optoelectronics and image processing (ICOIP). IEEE, pp 1–5
4. Amin R, Islam S H, Biswas G, Khan M K, Leng L, Kumar N (2016) Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput Netw 101:42–62
5. Angadi S A, Kagawade V C (2018) Detection of face spoofing using multiple texture descriptors. In: 2018 International conference on computational techniques, electronics and mechanical systems (CTEMS). IEEE, pp 151–156
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献