The 2nd competition on counter measures to 2D face spoofing attacks.
Ivana ChingovskaJ. YangZhen LeiDong YiStan Z. LiOlga KähmChristian GlaserNaser DamerArjan KuijperAlexander NouakJukka KomulainenTiago Freitas PereiraShubham GuptaShubham KhandelwalShubham BansalAyush RaiTarun KrishnaDushyant GoyalMuhammad-Adeel WarisHonglei ZhangIftikhar AhmadSerkan KiranyazMoncef GabboujRoberto TronciMaurizio PiliNicola SirenaFabio RoliJavier GalballyJulian FiérrezAllan da Silva PintoHélio PedriniW. S. SchwartzAnderson RochaAndré AnjosSébastien MarcelPublished in: ICB (2013)
Keyphrases
- countermeasures
- information security
- face recognition
- java card
- facial expressions
- security measures
- recognition algorithm
- human faces
- power analysis
- face images
- cyber attacks
- databases
- security breaches
- stereo vision
- pose normalization
- intrusion detection
- security issues
- face model
- face detection
- principal component analysis
- case study
- information systems
- computer vision