Creating Realistic Presentation Attacks for Facial Impersonation Step-by-Step.
Roberto Gallardo-CavaDavid Ortega-delCampoJulio Guillen-GarciaDaniel Palacios-AlonsoCristina CondePublished in: IEEE Access (2023)
Keyphrases
- smart card
- facial expressions
- face recognition
- facial images
- countermeasures
- human faces
- landmark detection
- security analysis
- security mechanisms
- multimedia
- authentication protocol
- malicious users
- malicious attacks
- facial expression recognition
- face images
- watermarking scheme
- facial features
- security protocols
- security threats
- behavior recognition
- denial of service attacks
- computer vision
- facial recognition
- attack detection
- security risks
- pose variations
- website