Mask spoofing in face recognition and countermeasures. Kose, N. & Dugelay, J. Image and Vision Computing , 32(10):779 - 789, 2014. Best of Automatic Face and Gesture Recognition 2013
Paper doi bibtex @Article{Kose_2014_16882,
author = {Kose, N. and Dugelay, J.-L.},
journal = {Image and Vision Computing },
note = {Best of Automatic Face and Gesture Recognition 2013 },
number = {10},
pages = {779 - 789},
title = {Mask spoofing in face recognition and countermeasures},
volume = {32},
year = {2014},
issn = {0262-8856},
keywords = {Face recognition },
url = {http://www.sciencedirect.com/science/article/pii/S0262885614001024},
doi = {http://dx.doi.org/10.1016/j.imavis.2014.06.003},
title_with_no_special_chars = {Mask spoofing in face recognition and countermeasures }
}
Downloads: 0
{"_id":"PQsuNDfghvZbzP8xB","bibbaseid":"kose-dugelay-maskspoofinginfacerecognitionandcountermeasures-2014","downloads":0,"creationDate":"2018-01-22T16:01:13.179Z","title":"Mask spoofing in face recognition and countermeasures","author_short":["Kose, N.","Dugelay, J."],"year":2014,"bibtype":"article","biburl":"http://www.uh.edu/bti/_files/bibsync_export2018-01-19.bib","bibdata":{"bibtype":"article","type":"article","author":[{"propositions":[],"lastnames":["Kose"],"firstnames":["N."],"suffixes":[]},{"propositions":[],"lastnames":["Dugelay"],"firstnames":["J.-L."],"suffixes":[]}],"journal":"Image and Vision Computing ","note":"Best of Automatic Face and Gesture Recognition 2013 ","number":"10","pages":"779 - 789","title":"Mask spoofing in face recognition and countermeasures","volume":"32","year":"2014","issn":"0262-8856","keywords":"Face recognition ","url":"http://www.sciencedirect.com/science/article/pii/S0262885614001024","doi":"http://dx.doi.org/10.1016/j.imavis.2014.06.003","title_with_no_special_chars":"Mask spoofing in face recognition and countermeasures ","bibtex":"@Article{Kose_2014_16882,\r\n author = {Kose, N. and Dugelay, J.-L.},\r\n journal = {Image and Vision Computing },\r\n note = {Best of Automatic Face and Gesture Recognition 2013 },\r\n number = {10},\r\n pages = {779 - 789},\r\n title = {Mask spoofing in face recognition and countermeasures},\r\n volume = {32},\r\n year = {2014},\r\n issn = {0262-8856},\r\n keywords = {Face recognition },\r\n url = {http://www.sciencedirect.com/science/article/pii/S0262885614001024},\r\n doi = {http://dx.doi.org/10.1016/j.imavis.2014.06.003},\r\n title_with_no_special_chars = {Mask spoofing in face recognition and countermeasures }\r\n}\r\n\r\n","author_short":["Kose, N.","Dugelay, J."],"key":"Kose_2014_16882","id":"Kose_2014_16882","bibbaseid":"kose-dugelay-maskspoofinginfacerecognitionandcountermeasures-2014","role":"author","urls":{"Paper":"http://www.sciencedirect.com/science/article/pii/S0262885614001024"},"keyword":["Face recognition"],"downloads":0},"search_terms":["mask","spoofing","face","recognition","countermeasures","kose","dugelay"],"keywords":["face recognition"],"authorIDs":[],"dataSources":["9cexBw6hrwgyZphZZ"]}