Zobrazeno 1 - 10
of 47
pro vyhledávání: '"Matteo Ferrara"'
Publikováno v:
IEEE Access, Vol 11, Pp 120419-120437 (2023)
Morphing Attack, i.e. the elusion of face verification systems through a facial morphing operation between a criminal and an accomplice, has recently emerged as a serious security threat. Despite the importance of this kind of attack, the development
Externí odkaz:
https://doaj.org/article/97dde6a462ce41cf85c41d38baf1ef99
Publikováno v:
IET Biometrics, Vol 10, Iss 3, Pp 290-303 (2021)
Abstract Nowadays, face morphing represents a big security threat in the context of electronic identity documents as well as an interesting challenge for researchers in the field of face recognition. Despite the good performance obtained by state‐o
Externí odkaz:
https://doaj.org/article/7468ae0d6c8d4753b134d181310c1a25
Publikováno v:
Energies, Vol 14, Iss 23, p 7932 (2021)
In space vehicles, the typical configurations for the Solar Array Power Regulators in charge of managing power transfer from the solar array to the power bus are quite different from the corresponding devices in use for terrestrial applications. A th
Externí odkaz:
https://doaj.org/article/e16ad6519f004a3e893143b802af5191
Publikováno v:
Sensors, Vol 21, Iss 10, p 3466 (2021)
Face morphing and related morphing attacks have emerged as a serious security threat for automatic face recognition systems and a challenging research field. Therefore, the availability of effective and reliable morphing attack detectors is strongly
Externí odkaz:
https://doaj.org/article/21917cc74ba5408daf0554a761208a03
In security systems the risk assessment in the sense of common criteria testing is a very relevant topic; this requires quantifying the attack potential in terms of the expertise of the attacker, his knowledge about the target and access to equipment
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5554ea01b1121038b1d918e45157403f
Publikováno v:
Energies, Vol 14, Iss 7932, p 7932 (2021)
In space vehicles, the typical configurations for the Solar Array Power Regulators in charge of managing power transfer from the solar array to the power bus are quite different from the corresponding devices in use for terrestrial applications. A th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::47a6f106b9449aaee6f71acb8a77675f
http://hdl.handle.net/11573/1587538
http://hdl.handle.net/11573/1587538
Autor:
Loic Bergeron, Florens Frans de Wit, Uwe Seidel, Davide Maltoni, Sergey Isadskiy, Christoph Busch, Ilias Batskos, Guoqiang Li, Dinusha Frings, Daniel Fischer, Raymond N.J. Veldhuis, Christian Rathgeb, Luuk Spreeuwers, Matteo Ferrara, Marta Gomez-Barrero, Fons Knopjes, Jag Mohan Singh, Annalisa Franco, Raghavendra Ramachandra, Sushma Venkatesh, Kiran B. Raja, Ulrich Scherhag
Publikováno v:
IEEE Transactions on Information Forensics and Security
IEEE transactions on information forensics and security, 16, 4336-4351. IEEE
IEEE transactions on information forensics and security, 16, 4336-4351. IEEE
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of advancements reported in recent works, we note serious open issues such as independent benchmarking, generalizability challenges and considerations to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::27a7b83f950ab529f77b1c1c4ef9b129
https://hdl.handle.net/11250/3024498
https://hdl.handle.net/11250/3024498
Publikováno v:
IEEE Transactions on Information Forensics and Security. 13:1008-1017
The morphing attack proved to be a serious threat for modern automated border control systems where face recognition is used to link the identity of a passenger to his/her e-document. In this paper we show that by exploiting the live face image acqui
Publikováno v:
Hand-Based Biometrics: Methods and Technology ISBN: 9781785612244
To make automatic fingerprint identification systems (AFIS) capable of searching across several millions of fingerprints in a few seconds, very powerful (and expensive) distributed computing architectures are typically used. The recent improvement of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0336a19d1d93f85c0489c883cc4b3d7d
http://hdl.handle.net/11585/619576
http://hdl.handle.net/11585/619576
Publikováno v:
Hand-Based Biometrics: Methods and Technology ISBN: 9781785612244
Synthetic Fingerprint generation techniques and associated tools (e.g., SFinGe) were introduced more than 15 years ago. The main aim was to generate large databases for performance evaluation without allocating huge amount of resources for acquisitio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f1296bc8cdbd644a99f09dfb44455ef7
http://hdl.handle.net/11585/619577
http://hdl.handle.net/11585/619577