Nowadays, we are experiencing an increasing demand for highly secure identification and personal verification technologies. This demand becomes even more apparent as we become aware of new security breaches and transaction frauds. In this context, biometrics has played a key role in the last decade providing tools and solutions either to verify or recognize the identity of a person based on physiological or behavioral characteristics. Among the used features are face, fingerprints, hand geometry, handwriting, iris, retinal vein, and voice. Such methods, however, sometimes can be fooled (spoofed) by an identity thief, specially the ones based on face recognition, in which the thief can obtain a photo of an authentic user from a significant distance, or even obtain it from the Internet.
|1.||(2015): Face Spoofing Detection Through Visual Codebooks of Spectral Temporal Cubes. In: Image Processing, IEEE Transactions on, 24 (12), pp. 4726-4740, 2015, ISSN: 1057-7149.|
|2.||(2015): Deep Representations for Iris, Face, and Fingerprint Spoofing Detection. In: Information Forensics and Security, IEEE Transactions on, 10 (4), pp. 864-879, 2015, ISSN: 1556-6013.|
|3.||(2015): Using Visual Rhythms for Detecting Video-Based Facial Spoof Attacks. In: Information Forensics and Security, IEEE Transactions on, 10 (5), pp. 1025-1038, 2015, ISSN: 1556-6013.|
|4.||(2013): Competition on Counter Measures to 2D Facial Spoofing Attacks. In: International Joint Conference on Biometrics, 2013.|
|5.||(2012): Video-Based Face Spoofing Detection through Visual Rhythm Analysis. In: Conference on Graphics, Patterns and Images, 2012.|
|6.||(2011): The 2nd Competition on Counter Measures to 2D Face Spoofing Attacks. In: International Conference on Biometrics, pp. 1-6, 2011.|
|7.||(2011): Face Spoofing Detection through Partial Least Squares and Low-Level Descriptors. In: International Joint Conference on Biometrics, 2011.|