![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Detecting Face Morphing Attacks with Collaborative Representation of Steerable Features
have used face characteristics to verify and establish the identity of an individual. Face images provide high accuracy in verification and also present the opportunity of verifying the identity visua...
-
Chapter
Adversarial Attacks on Face Recognition Systems
Face has been widely used for identity verification both in supervised and unsupervised access control applications. The advancement in deep neural networks has opened up the possibility of scaling it to m...
-
Chapter
Smartphone Multi-modal Biometric Presentation Attack Detection
Biometric verification is widely employed on smartphones for various applications, including financial transactions. In this work, we present a new multi-modal biometric dataset (face, voice, and periocular) a...
-
Chapter
Vision Transformers for Fingerprint Presentation Attack Detection
Automated fingerprint recognition systems, while widely used, are still vulnerable to presentation attacks (PAs). The attacks can employ a wide range of presentation attack species (i.e., artifacts), varying f...