基于多特征融合的3D打印面具攻击检测 下载: 1255次封面文章
陆经纬, 陈鹤天, 马肖攀, 陈继民. 基于多特征融合的3D打印面具攻击检测[J]. 激光与光电子学进展, 2019, 56(3): 031002.
Jingwei Lu, Hetian Chen, Xiaopan Ma, Jimin Chen. 3D Printing Mask Attacks Detection Based on Multi-Feature Fusion[J]. Laser & Optoelectronics Progress, 2019, 56(3): 031002.
[1] 张敏贵, 周德龙, 潘泉, 等. 生物特征识别及研究现状[J]. 生物物理学报, 2002, 18(2): 156-162.
[2] Nixon KA, AimaleV, Rowe RK. Spoof detection schemes[M] ∥Boston: Springer US, 2008: 403- 423.
[3] ChettyG, WagnerM. Multi-level liveness verification for face-voice biometric authentication[C]∥Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference, 2006: 1- 6.
[4] PanG, SunL, Wu ZH, et al. Eyeblink-based anti-spoofing in face recognition from a generic webcamera[C]∥IEEE 11th International Conference on Computer Vision, 2007: 1- 8.
[5] KollreiderK, FronthalerH, BigunJ. Evaluating liveness by face images and the structure tensor[C]//Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05), 2005: 75- 80.
[6] de MarsicoM, NappiM, RiccioD, et al. Moving face spoofing detection via 3D projective invariants[C]∥2012 5th IAPR International Conference on Biometrics (ICB), 2012: 73- 78.
[7] 孔月萍, 刘霞, 谢心谦, 等. 基于梯度方向直方图的人脸活体检测方法[J]. 激光与光电子学进展, 2018, 55(3): 031009.
[8] MäättäJ, HadidA, PietikäinenM. Face spoofing detection from single images using micro-texture analysis[C]∥International Joint Conference on Biometrics (IJCB), 2011: 1- 7.
[9] 谷小婧, 付传卿, 顾幸生. 基于面部生命特征的3D假面欺骗攻击检测方法[J]. 系统仿真学报, 2016, 28(2): 361-368.
[10] WallaceR, McLaren M, McCool C, et al. Inter-session variability modelling and joint factor analysis for face authentication[C]∥International Joint Conference on Biometrics (IJCB), 2011: 1- 8.
[11] ErdogmusN, MarcelS. Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect[C]∥IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), 2013: 1- 6.
[13] Zhang ZW, YiD, LeiZ, et al. Face liveness detection by learning multispectral reflectance distributions[C]∥Face and Gesture, 2011: 436- 441.
[14] KoseN, Dugelay JL. Countermeasure for the protection of face recognition systems against mask attacks[C]∥10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), 2013: 1- 6.
[16] AgarwalA, SinghR, VatsaM. Face anti-spoofing using Haralick features[C]∥IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), 2016: 1- 6.
[18] Sun X, Morvan J M. Curvature measures, normal cycles and asymptotic cones[J]. Actes des Rencontres Du CIRM, 2013, 3(1): 3-10.
[20] Cohen-SteinerD, Morvan JM. Restricted delaunay triangulations and normal cycle[C]∥Proceedings of the nineteenth Conference on Computational Geometry - SCG '03, the Nineteenth Conference, 2003.
[22] 侯一民, 隋文秀, 孙晓雪. SIFT特征降维方法及其在图像检索中的应用[J]. 中国激光, 2015, 42(s1): s108002.
[24] 熊风光, 霍旺, 韩燮, 等. 三维点云中关键点误匹配剔除方法[J]. 光学学报, 2018, 38(2): 0210003.
陆经纬, 陈鹤天, 马肖攀, 陈继民. 基于多特征融合的3D打印面具攻击检测[J]. 激光与光电子学进展, 2019, 56(3): 031002. Jingwei Lu, Hetian Chen, Xiaopan Ma, Jimin Chen. 3D Printing Mask Attacks Detection Based on Multi-Feature Fusion[J]. Laser & Optoelectronics Progress, 2019, 56(3): 031002.