3D face reconstruction algorithms from images and videos are applied to ...
Fingerprint authentication systems are highly vulnerable to artificial
r...
The diffusion of fingerprint verification systems for security applicati...
The International Fingerprint Liveness Detection Competition is an
inter...
In this study we investigate a textural processing method of
electroence...
We present a novel descriptor for crowd behavior analysis and anomaly
de...
In the last five years, deep learning methods, in particular CNN, have
a...
We investigated the threat level of realistic attacks using latent
finge...
The boosting on the need of security notably increased the amount of pos...
Fingerprint Liveness detection, or presentation attacks detection (PAD),...
The International Fingerprint liveness Detection Competition (LivDet) is...
Fingerprint Presentation Attack Detection (FPAD) deals with distinguishi...
A spoof attack, a subset of presentation attacks, is the use of an artif...
Prior work has shown that multibiometric systems are vulnerable to
prese...