Gait biometrics under spoofing attacks: an experimental investigation.
Abdenour HadidMohammad GhahramaniVili KellokumpuXiaoyi FengJohn D. BustardMark S. NixonPublished in: J. Electronic Imaging (2015)
Keyphrases
- human identification
- gait recognition
- biometric systems
- person identification
- gait analysis
- human gait
- biometric template
- human recognition
- ddos attacks
- malicious attacks
- human gait recognition
- security threats
- human motion
- biometric data
- countermeasures
- biometric authentication
- feature extraction
- palmprint
- personal identification
- malicious users
- gait cycle
- background subtraction
- iris recognition
- watermarking scheme
- cyber attacks
- gait patterns
- security mechanisms
- identity theft
- face recognition
- pattern classification
- identity verification
- recognition algorithm
- biometric recognition
- motion capture
- security risks
- security protocols
- video sequences
- feature analysis
- image sequences