Spoofing face recognition with 3D masks. Erdogmus, N. & Marcel, S. IEEE Transactions on Information Forensics and Security, 9(7):1084-1097, jul, 2014. doi bibtex @Article{Erdogmus_2014_16872,
author = {Erdogmus, N. and Marcel, S.},
journal = {IEEE Transactions on Information Forensics and Security},
month = {jul},
number = {7},
pages = {1084-1097},
title = {Spoofing face recognition with 3D masks},
volume = {9},
year = {2014},
issn = {1556-6013},
keywords = {face recognition;image texture;security of data;2.5D face recognition;2D attacks;2D face recognition;3D face recognition;3D facial masks;3D mask attack database;3D reconstruction technology;Morpho database;biometric traits;biometrics domain;face spoofing attacks;presentation attacks;printing technology;spoofing face recognition;texture-based countermeasures;Databases;Face;Face recognition;Materials;Solid modeling;Three-dimensional displays;Videos;Spoofing;face recognition;mask attack;presentation attack},
doi = {10.1109/TIFS.2014.2322255},
title_with_no_special_chars = {Spoofing Face Recognition With 3D Masks}
}
Downloads: 0
{"_id":"KmzAqtakTqKabFPQr","bibbaseid":"erdogmus-marcel-spoofingfacerecognitionwith3dmasks-2014","downloads":0,"creationDate":"2018-01-22T16:01:13.168Z","title":"Spoofing face recognition with 3D masks","author_short":["Erdogmus, N.","Marcel, S."],"year":2014,"bibtype":"article","biburl":"http://www.uh.edu/bti/_files/bibsync_export2018-01-19.bib","bibdata":{"bibtype":"article","type":"article","author":[{"propositions":[],"lastnames":["Erdogmus"],"firstnames":["N."],"suffixes":[]},{"propositions":[],"lastnames":["Marcel"],"firstnames":["S."],"suffixes":[]}],"journal":"IEEE Transactions on Information Forensics and Security","month":"jul","number":"7","pages":"1084-1097","title":"Spoofing face recognition with 3D masks","volume":"9","year":"2014","issn":"1556-6013","keywords":"face recognition;image texture;security of data;2.5D face recognition;2D attacks;2D face recognition;3D face recognition;3D facial masks;3D mask attack database;3D reconstruction technology;Morpho database;biometric traits;biometrics domain;face spoofing attacks;presentation attacks;printing technology;spoofing face recognition;texture-based countermeasures;Databases;Face;Face recognition;Materials;Solid modeling;Three-dimensional displays;Videos;Spoofing;face recognition;mask attack;presentation attack","doi":"10.1109/TIFS.2014.2322255","title_with_no_special_chars":"Spoofing Face Recognition With 3D Masks","bibtex":"@Article{Erdogmus_2014_16872,\r\n author = {Erdogmus, N. and Marcel, S.},\r\n journal = {IEEE Transactions on Information Forensics and Security},\r\n month = {jul},\r\n number = {7},\r\n pages = {1084-1097},\r\n title = {Spoofing face recognition with 3D masks},\r\n volume = {9},\r\n year = {2014},\r\n issn = {1556-6013},\r\n keywords = {face recognition;image texture;security of data;2.5D face recognition;2D attacks;2D face recognition;3D face recognition;3D facial masks;3D mask attack database;3D reconstruction technology;Morpho database;biometric traits;biometrics domain;face spoofing attacks;presentation attacks;printing technology;spoofing face recognition;texture-based countermeasures;Databases;Face;Face recognition;Materials;Solid modeling;Three-dimensional displays;Videos;Spoofing;face recognition;mask attack;presentation attack},\r\n doi = {10.1109/TIFS.2014.2322255},\r\n title_with_no_special_chars = {Spoofing Face Recognition With 3D Masks}\r\n}\r\n\r\n","author_short":["Erdogmus, N.","Marcel, S."],"key":"Erdogmus_2014_16872","id":"Erdogmus_2014_16872","bibbaseid":"erdogmus-marcel-spoofingfacerecognitionwith3dmasks-2014","role":"author","urls":{},"keyword":["face recognition;image texture;security of data;2.5D face recognition;2D attacks;2D face recognition;3D face recognition;3D facial masks;3D mask attack database;3D reconstruction technology;Morpho database;biometric traits;biometrics domain;face spoofing attacks;presentation attacks;printing technology;spoofing face recognition;texture-based countermeasures;Databases;Face;Face recognition;Materials;Solid modeling;Three-dimensional displays;Videos;Spoofing;face recognition;mask attack;presentation attack"],"downloads":0},"search_terms":["spoofing","face","recognition","masks","erdogmus","marcel"],"keywords":["face recognition;image texture;security of data;2.5d face recognition;2d attacks;2d face recognition;3d face recognition;3d facial masks;3d mask attack database;3d reconstruction technology;morpho database;biometric traits;biometrics domain;face spoofing attacks;presentation attacks;printing technology;spoofing face recognition;texture-based countermeasures;databases;face;face recognition;materials;solid modeling;three-dimensional displays;videos;spoofing;face recognition;mask attack;presentation attack"],"authorIDs":[],"dataSources":["9cexBw6hrwgyZphZZ"]}