Exploring presentation attack vulnerability and usability of face recognition systems
Abstract Commercial face recognition software intended for the use of access control is evaluated. Most of the systems are to be used with hand‐held devices (smartphones). The systems under test also contain three stationary systems designed to unlock doors or other secure entrance systems. While sp...
Saved in:
| Main Authors: | Heinz Hofbauer, Luca Debiasi, Susanne Kränkl, Andreas Uhl |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2021-03-01
|
| Series: | IET Biometrics |
| Subjects: | |
| Online Access: | https://doi.org/10.1049/bme2.12015 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
On the generalisation capabilities of Fisher vector‐based face presentation attack detection
by: Lázaro J. González‐Soler, et al.
Published: (2021-09-01) -
Face morphing detection in the presence of printing/scanning and heterogeneous image sources
by: Matteo Ferrara, et al.
Published: (2021-05-01) -
PigFRIS: A Three-Stage Pipeline for Fence Occlusion Segmentation, GAN-Based Pig Face Inpainting, and Efficient Pig Face Recognition
by: Ruihan Ma, et al.
Published: (2025-03-01) -
A Comprehensive Survey of Masked Faces: Recognition, Detection, and Unmasking
by: Mohamed Mahmoud, et al.
Published: (2024-09-01) -
Optimized multi‐biometric enhancement analysis
by: Saliha Artabaz, et al.
Published: (2021-05-01)