1. Avcibas et al (2003) Steganalysis using image quality metrics. IEEE Trans Image Process 12(2):221–229
2. Bayram S et al (2006) Image manipulation detection. J Electron Imaging 15(4):041102–041102
3. Bledsoe WW (1964) The model method in facial recognition, Panoramic Research Inc., Palo Alto. CA, Technical Report, Technical Report PRI: 15
4. Boulkenafet Z et al (2017) A competition on generalized software-based face presentation attack detection in mobile scenarios. 2017 IEEE International Joint Conference on Biometrics (IJCB). IEEE
5. Chakka MM et al (2011) Competition on countermeasures to 2-d facial spoofing attacks." Biometrics (IJCB), 2011 International Joint Conference on. IEEE