Mask spoofing in face recognition and countermeasures.
Neslihan KoseJean-Luc DugelayPublished in: Image Vis. Comput. (2014)
Keyphrases
- countermeasures
- face recognition
- information security
- face images
- face verification
- discriminant analysis
- face detection
- human faces
- power analysis
- linear discriminant analysis
- feature extraction
- liveness detection
- principal component analysis
- visible light
- java card
- security issues
- security measures
- rural areas
- computer vision
- cyber attacks
- resource constrained
- security breaches
- object recognition