On the vulnerability of face recognition systems to spoofing mask attacks.
Neslihan KoseJean-Luc DugelayPublished in: ICASSP (2013)
Keyphrases
- face recognition systems
- face verification
- buffer overflow
- face images
- face recognition
- security risks
- security vulnerabilities
- face matching
- face recognition algorithms
- face detection
- ddos attacks
- illumination variations
- principal component analysis
- state space
- face databases
- biometric systems
- viewpoint
- high quality
- data corruption
- data sets